Skip to main content

Full text of "United States v. Manning Unofficial Transcripts"

See other formats


In The Matter Of: 

United States vs. 
PFC Bradley E. Manning 



Vol. 21 
July 25, 2013 
UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



Provided by Freedom of the Press Foundation 



Min-U-Script® with Word Index 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



1 

VOLUME XXI 
IN THE UNITED STATES ARMY 

UNITED STATES 
VS. 

MANNING, Bradley E., PFC COURT-MARTIAL 
U.S. Army, xxx— xx— 9504 

Headquarters and Headquarters Company, 

U.S. Army Garrison, 

Joint Base Myer— Henderson Hall, 

Fort Myer, VA 22211 

/ 

The Hearing in the above— titled matter was 
continued on Thursday, July 25, 2013, at 1:30 p.m., at 
Fort Meade, Maryland, before the Honorable Colonel 
Denise Lind, Judge. 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



2 

DISCLAIMER 
This transcript was made by a court 
reporter who is not the official Government reporter, 
was not permitted to be in the actual courtroom where 
the proceedings took place, but in a media room 
listening to and watching live audio/video feed, not 
permitted to make an audio backup recording for editing 
purposes, and not having the ability to control the 
proceedings in order to produce an accurate verbatim 
transcript . 

This unedited, uncertified draft transcript 
may contain court reporting outlines that are not 
translated, notes made by the reporter for editing 
purposes, misspelled terms and names, word combinations 
that do not make sense, and missing testimony or 
colloquy due to being inaudible by the reporter. 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



APPEARANCES : 

ON BEHALF OF GOVERNMENT: 
MAJOR ASHDEN FEIN 
CAPTAIN JOSEPH MORROW 
CAPTAIN ANGEL OVERGAARD 
CAPTAIN HUNTER WHYTE 
CAPTAIN ALEXANDER von Elten 

ON BEHALF OF ACCUSED: 
DAVID COOMBS 
CAPTAIN JOSHUA TOOMAN 
MAJOR THOMAS HURLEY 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



4 

PROCEEDINGS, 

THE JUDGE: Court is called to order. Let 
the record reflect all parties present when the court 
last recessed are again present in the court. 

Major Fein? 

MR. FEIN: Your Honor, the next dataset 
CIDNE-Iraq, CIDNE Afghanistan sets. These go to 
Specifications 4, 5, 6 and 7 of Charge 2. 

Your Honor, essentially, to use 
PFC Manning's own Words, the inventory of SIGACTS that 
he released to WikiLeaks is, quote, one of the more 
significant documents of our time because it reveals 
the true nature of the 21st century asymmetric warfare. 
Prosecution Exhibit 42 . The document that was included 
the CIDNE-I and CIDNE-A SIGACTS on the SD card. 

To truly understand why PFC Manning himself 
considered these SIGACTS so important begs the 
question: What is a SIGACT? 

By definition, a SIGACT is a report of 
significant activity captured in theater. SIGACTS 
capture enemy activities, our responses and our TTPs to 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



5 

win our wars . 

For example, if the military convoy were 
hit by an IED, that event would be captured in a 
SIGACT. 

Your Honor, what else would be captured in 
a SIGACT? Where and when the attack happened, which 
unit was involved, the type of IED, how successful the 
attack was, whether there were any casualties, which 
enemy organizations are responsible for the attack, 
what tactical intelligence we gathered from the attack 
and what steps we took in response to the attack . 
Simply put, Your Honor, SIGACTS detail how we defeat 
our enemies and what enemies use to harm us . 

Your Honor, how do we use SIGACTS? 

Mr. Hall testified that commanders in the 
field use SIGACTS every day to make tactical decisions . 

Mr. Hall testified that intelligence 
analysts are often tasked to provide the commander with 
insights into what events have taken place along, for 
example, a main supply route over a certain period of 
time . 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



6 

Intelligence analysts pull all SIGACTS 
taking place on that supply road. They plot those 
events on a map so that the commander can visualize the 
enemy and what the enemy is doing or not doing. 

These aids help the commander understand 
the enemy trends and decide whether to continue using 
that supply route or redirect the convoy in a different 
direction . 

Commanders use SIGACTS every day to make 
decisions to defeat the enemy and protect our soldiers . 

As Captain Fulton testified, the commander 
of 210 Mountain relied on her predictive analysis and 
he was no different. Captain Fulton, on a weekly 
basis, briefed Colonel Miller on enemy trends they were 
identified based off of SIGACTS by PFC Manning. Those 
SIGACTS helped Colonel Miller decide how to employ the 
sources, protect soldiers. 

Sergeant First Class Anica, he also gave 
the court an example of how the date of a SIGACT does 
not necessarily correlate to its value to commanders . 
He testified about an event that happened during a 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



7 

previous deployment where two soldiers were captured by 
enemy forces . He explained how the unit reviewed 
SIGACTS for the three to four years to determine what 
enemy was located in that area and what tactics, 
techniques and procedures those in that area employed 
in order to figure out where those two soldiers could 
be found. 

Those SIGACTS help the unit determine who 
was responsible for the captured and where they were 
being held captured. 

Sergeant First Class Anica testified that 
he trained PFC Manning prior to the deployment on the 
use of SIGACTS and how critical they are, even older 
SIGACTS and how the enemy understands our forces . 

Why do we store SIGACTS in SIPRNET? 

SIGACTS are only available on SIPRNET 
because they're an invaluable resource that is 
released, Your Honor, to the enemy to not only teach 
them about our TTPs but reveal what we know about them. 

Each intelligence professional from 210 
Mountain testified to this point. They testified that 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



8 

with this tactical insight, the enemy can adjust and 
become more successful in carrying out their attacks. 

Why do we safeguard the tactical reports? 
Because those reports help us to make all the tactical 
decisions necessary to defeat the enemies . 

The value of the tactical reports correlate 
to the exclusive use and benefit of this information. 
This is the type of information PFC Manning disclosed 
to WikiLeaks knowing that terrorist organizations use 
WikiLeaks to gather intelligence such as the marine 
table (inaudible) . 

This is not purely historical data without 
any value as the defense argued. Instead, this is 
data, this data is extremely valuable for tour 
commanders as part of the military decision— making 
process to make realtime decisions that ultimately save 
our lives . 

Furthermore, Your Honor, the value of the 
tactical information to our enemies is without 
question — well, is without question the value, 
especially given the fact that OBL himself, Osama bin 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



9 

Laden himself, asked for information and received it, 
the SIGACTS from the CIDNE database for Afghanistan. 

And now, because of PFC Manning, this is 
the type of tactical information that was and is in the 
hands of OBL on the day he died and currently in the 
hands of all enemies of the United States . 

Your Honor, the Combined Information Data 
Network, CIDNE, is the direct reporting system used by 
all forces within the US CENTCOM. 

The program manager testified that he's 
(inaudible) to separately track our combine operations 
in Iraq and also track in Afghanistan. 

Your Honor, you heard testimony that a 
significant activity generally consists of key leader 
engagements, mission report logs which track troop 
movements (inaudible) , focus on duty, status 
whereabouts and known DUST worm, which will you 
describe the names of captured or missing service 
members in the TTP that we employ to locate our missing 
service members . 

Captain Lim testified that SIGACTS also 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



10 

include the names of detained persons and local 
nationals, some of whom made these sources for 
neighboring U.S. source forces, (inaudible). Certain 
weaponry they use against the United States . 

Your Honor, within seven weeks of having 
access to SIPRNET, PFC Manning deliberately chose to 
download and steal a portion of the CIDNE— I Iraq 
database containing more than 380,000 SIGACTS and a 
portion of the CIDNE— A Afghanistan database containing 
more than 90,000 SIGACTS. 

PFC Manning had extensive experience 
dealing with SIGACTS at Fort Drum and FOB Hammer. 

PFC Manning provided weekly briefings based 
on SIGACTS based off also their anticipated need 
because they were going to employ first Afghanistan and 
then Iraq. 

At FOB Hammer, members of the PFC Manning 
unit testified that PFC Manning had constant exposure 
to AO, particularly the SIGACTS related to IEDs . 

So what did Private First Class Manning do 
with these trained skills? Starting in late December 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



11 

of 2009 he began exporting hundreds of thousands of 
SIGACTS from 2004 to 2009. That's six years or 72 
months of SIGACTS from two different databases. 

The CIDNE databases contained an export 
feature to allow intelligence analysts to export 
SIGACTS in 30— day increments as part of their study of 
enemy trends over a period of time. 

Therefore, in order to export the SIGACTS, 
Private First Class Manning had to export them in 
monthly increments . 

Put another way, he had to click the export 
classic Excel function on the bottom right of the CIDNE 
screen. He had to push it 72 times per database to 
accomplish this feat. That's a total of 144 times he 
had to click export to take all the SIGACTS from 
CIDNE— A and I databases at this time, the first part of 
January . 

Pulling the SIGACTS from the CIDNE 
Afghanistan database even required more diligence and 
advanced understanding of the networks on SIPRNET. 

PFC Manning was stationed in Iraq at the 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



12 

time, deployed in Iraq. 

The main CIDNE Afghanistan database was 
inaccessible in Afghanistan, a specific design 
limitation . 

Mr. Holifeld testified that CENTCOM 
maintained CIDNE servers in Tampa as well as both 
theaters of operation in Iraq and Afghanistan. 

The CIDNE— Iraq and Afghanistan servers do 
not share the same information. 

The CIDNE Afghanistan database is only 
available to users hooked up to servers located in 
Afghanistan or the backup server in Tampa. 

Your Honor, the defense seems to imply that 
PFC Manning downloaded SIGACTS to create local backup 
disks. In case the SIPRNET or D6-A doesn't work, the 
defense presented no evidence that this actually 
occurred. In fact, the evidence for CIDNE— A is to the 
contrary . 

Special Agent Shaver testified that 
PFC Manning's computer connected with the CIDNE 
Afghanistan server in Tampa between 1 and 7 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



13 

January 2010, the Centaur logs, again measuring net 
flow data captured this activity that's at Prosecution 
Exhibit 152, Your Honor. 

The logs also show that the only times that 
PFC Manning's computer connected to the CIDNE— A servers 
in Tampa were between 1 and 7 January 2010 and no other 
time in the 103 days recorded in the Centaur logs. 

Mr. Holifeld testified that PFC Manning 
pulled the last batch of SIGACTS from the SIGACT Iraq 
database on 3 January 2010, on 3 January 2010. 

He also testified that PFC Manning pulled 
the batch of SIGACTS from CIDNE -A database four days 
later, on 7 January 2010, 7 January, 2010. 

Private Manning stored the CIDNE databases 
in a password protected folder named yadda dot tar dot 
bz2 at dot NC . You heard from Special Agent Shaver, 
and that was on an SD card that was later found and 
admitted as PE92 . 

Special Agent Shaver also testified that 
this folder on the SD card was created on 30 
January 2010. 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



14 

He testified that he was able to view the 
content of this folder by using the same password 
PFC Manning provided Adrian Lamo on his chats . 

He testified that within the yadda folder 
there were three different files in that encrypted 
file. 

The portions of the CIDNE-I and CIDNE-A 
databases containing the SIGACTS were stored under the 
file names Iraq underscore events dot CSV — excuse me, 
IRQ underscore events dot CSV and AFG underscore events 
dot CSV. 

These are two CSV files which you've heard 
is essentially the same as an Excel spreadsheet. 

Special Agent Shaver testified that the 
file name IRQ dot CSQ was last written on 5 
January 2010 and the Afghanistan file was written three 
days later, 8 January 2010. 

Your Honor, we knew that PFC Manning took 
his SD card containing more than 470,000 SIGACTS from 
the CIDNE-A and CIDNE-I databases with him on R and R. 

Special Agent Mander testified that SD card 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



15 

was found at PFC Manning's aunt's house at Potomac, 
Maryland where he stayed during R and R. It was during 
this time in R and R when PFC Manning transferred the 
SIGACTS from his personal computer to WikiLeaks and 
then his SD card onto his SD card for safekeeping. 

Your Honor, the evidence shows that the 
transmission occurred prior to 1 February 2010 while 
PFC Manning was in Boston visiting friends . A transfer 
to WikiLeaks occurred prior to 1 February, 2010, while 
PFC Manning was in Boston . 

How do we know this? PFC Manning 
forensically wiped his computer and reinstalled the 
operator system on 30 January 2010. Prosecution 
Exhibit Alpha and 126 Bravo are the install logs from 
PFC Manning ' s personal computer . 

THE JUDGE: What was the Prosecution 

Exhibit? 

MR. FEIN: Yes, ma'am, Prosecution Exhibit 
126 Alpha and Bravo. 

PFC Manning's aunt testified that while on 
R and R leave PFC Manning left Potomac, Maryland on 25 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



16 

January and returned on 1 February 2010. 

The disk utility log from PFC Manning's 
personal computer, that's Prosecution Exhibit 125, 
Prosecution Exhibit 125 and specifically lines 78 
through 86. 78 through 86 show PFC Manning executing a 
7— pass disk erase. After three hours and 48 minutes it 
was complete, forensically wiping his machine on 31 
January 20,10, not one time, Your Honor, seven times, 
and after three hours it was complete . 

Mr. Johnson testified that, based off his 
review of this log, that PFC Manning successfully wiped 
all of the evidence that had been deleted on his 
personal computer on this date . This occurred while he 
was still in Boston. 

Your Honor, Defense Exhibit Juliet, Defense 
Exhibit Juliet is the forensic report for PFC Manning's 
personal Macintosh computer . 

Prosecution Exhibit 179. Prosecution 
Exhibit 17 9 are all the attachments and enclosures to 
that report . 

Other than the one SIGACT that Special 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



17 

Agent Shaver was able to recover from March 2010 on his 
personal map, there are no other SIGACTS on the 
computer, not a single remnant of 470,000 SIGACTS from 
30 January 2010 and forward — excuse me — 31 
January 2010 on his personal computer. 

The only reasonable explanation for this, 
Your Honor, is that PFC Manning erased any evidence of 
the transmission of the SIGACT to WikiLeaks when he 
wiped the free space on his computer on 31 January 
2010 . 

Otherwise, some remnant of the 470,000 
SIGACTS would likely be on his computer like the volume 
dot txt and other recovered documents. The 
transmission had to have occurred prior to 31 
January 2010. 

Once returning from Boston, PFC Manning 
left that SD card along with other possessions of his 
at his aunt ' s house in Maryland, and that ' s after 
disclosing the SIGACTS to WikiLeaks while he was in 
Boston . 

Located in that same encrypted file with 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



18 

the SIGACTS on the SD card, PFC Manning wrote and 
stored a document he called read me dot text admitted 
into evidence as PE42 . 

Your Honor, displayed on the screen is 
PE42 . WikiLeaks, note to WikiLeaks, PFC Manning note 
to WikiLeaks explaining the items of historic 
significance, although he ignored his training and 
experience when it came to compromising classified 
information . 

It is clear he applied the same training 
and experience to identify the SIGACTS themselves were 
historical significance and compilation was more of 
significant documents . 

Your Honor, what did PFC Manning also know 
in late January 2010, that this information was also 
significant to the enemies of the United States, 
removing the fog of war that protected us from 
unconventional enemies and those that fight on the 
asymmetric battlefield. 

Although he is the source of these SIGACTS 
would be protected if the information was sat on for 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



19 

perhaps 90 to 100 days, he would be protected as the 
source if it was sat on between 90 and 180 days. 

He knew, he knew that all of the 
intelligence and individuals named within those reports 
would never be protected once it was removed from the 
classified SIPRNET system and released to the world. 

Your Honor, again that is Prosecution 

Exhibit 42 . 

Your Honor, how proud was PFC Manning of 
his actions knowing he was able to get away with this 
and finally start down the path of obtaining the 
worldwide notoriety . 

You've seen the picture, Prosecution 
Exhibit 40, with the same read me dot text file. He 
stood smiling at his aunt ' s house holding the same 
camera that — the SD card on the camera in this 
picture had 417,000 SIGACTS, the read me dot text file 
that he wanted to sit on the information and protect 
him smiling in that photo, and not protect the Iraqi 
and Afghanis and U.S. soldiers and everyone else in all 
the missions in Afghanistan. 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



20 

In this particular (inaudible) , Your Honor, 
this is not a picture of a person, of a troubled person 
conflicted by his action as the defense wants you to 
believe . This is a picture of a person who thought he 
was finally becoming famous with that information on 
the SD card. 

Your Honor, the CIDNE SIGACTS were the 
first large scale thefts of information by PFC Manning. 
It is clear that PFC Manning viewed the SD card as his 
own trophy for his accomplishments. 

Could he have kept the information erased 
on his personal computer and not copied over to SD card 
after disclosing the contents to WikiLeaks? Yes. But 
just like he created the mock tasking order that we 
would talk about later detailing his intent, 
PFC Manning wanted to forever memorialize for himself 
the fruit to his labor as he continued to exfiltrate 
U.S. Government databases and portions thereof. 

Even five months later, Your Honor, on 
2 6 May 2010, PFC Manning stated to Adrian Lamo that he 
provided what he called highlights of the disclosures 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



21 

which included the SIGACTS within the CIDNE databases . 
That's on page 46, Your Honor, of the Lamo chats. Thus 
admitted to providing portions of the CIDNE— A and A 
database to WikiLeaks and recognizing the inherent 
importance of these documents . 

When PFC Manning extracted records from the 
CIDNE database to his personal computer, he completed 
his theft of those records . 

The SIGACTS from the CIDNE databases are 
stored on a classified system and only available to 
authorized personnel with a need to know and who could 
access them on SIPRNET. 

At no time was PFC Manning authorized to 
house those records on his personal laptop or on his SD 
card at his aunt's house. 

Furthermore, PFC Manning converted the 
information of the records from the CIDNE databases 
from, he conveyed them to WikiLeaks for publication. 

PFC Manning specifically intended for the 
records to be released and WikiLeaks obliged. The 
United States devoted significant resources to protect 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



22 



this classified information. 

Mr. Lewis testified that foreign 
intelligence services will pay for the information 
precisely because its exclusive possession provides a 
significant benefit to the United States . The 
publication of SIGACTS from the CIDNE databases 
completely deprived the United States of this exclusive 
possession of the use of that information. 

Your Honor, PFC Manning knew the charge 
documents for specifications 5 and 7 of charge 2 were 
classified. These documents are probably marked secret 
within the classified information field of SIGACT 
reports . 

Further, these documents are located on 
SIPRNET and the United States has not made these 
documents available to the public . They were closely 
held. 

The charged documents themselves for 
specifications 5 and 7 of charge 2 relates to the 
national defense of the United States . Lieutenant 
Commander Hoskins and Lieutenant Colonel Nehring both 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



23 

testified the documents contained a type of information 
which would cause serious harm to national security and 
thus should be secret . 

It was the type of information that could 
be useful to our adversaries and the type of 
information that PFC Manning knew would be useful to 
the adversaries . 

Admiral (inaudible) US CENTCOM deputy 
commander and the OCA testified that the charge 
documents within both datasets, the CIDNE-I SIGACTS and 
CIDNE-A SIGACTS, are classified at secret level because 
their release could cause harm to national security . 

Your Honor, if I may have a moment. 

THE JUDGE : Yes . 

MR. FEIN: Your Honor, PFC Manning and 
Major Hurley have relocated to the witness box in order 
to look at classified information and I have handed 
them each a copy and the Court Appellate Exhibit 617, 
the government classified supplemented closing 
argument . 

Your Honor, Mr. Lewis testified that the 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



24 

value of the SIGACTS from the CIDNE-A database far 
exceeds the statutory minimums . 

Specifically, Mr. Lewis testified that the 
Foreign Intelligence Services of multiple countries 
actively seek information contained within the SIGACTS 
and would pay money from the SIGACTS from CIDNE 
Afghanistan . 

The Foreign Intelligence Services seek 
information pertaining to the United States military 
tactics, techniques and procedures, TTPs, which show 
operation strategies, responses to attacks and the 
units involved in TTPs and military operations in 
Afghanistan detailed in classified reason number 1 . 

Your Honor, when you're finished looking at 
classified reason 1, would you please let me know and 
I ' 11 continue . 

THE JUDGE: I have. 

MR. FEIN: Yes, ma'am. 

Your Honor, Mr. Lewis testified that 
country 1 would pay at least $10,000 for the 
compromised SIGACTS from the CIDNE-A database and 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



25 

Mr. Lewis called his valuation conservative as set 
forth in classified reason 2 . 

Your Honor, a Foreign Intelligence Service 
has paid $50 each for documents containing information 
similar to that found in the SIGACTS . Mr. Lewis 
determined that a Foreign Intelligence Service would 
value at least 30 percent of the SIGACTS from the 
CIDNE-A database . 

Based on Mr. Lewis' evaluation and the 
price paid per document, the 90,000 SIGACTS from the 
CIDNE— A database are worth approximately $1.3 million 
to a Foreign Intelligence Service . 

Your Honor, that is 30 percent of 90,000 
documents times $50 . 

Your Honor, Mr. Lewis also testified that 
the value of the SIGACTS from the CIDNE-I Iraq database 
far exceeded the statutory minimums . 

Specifically, Mr. Lewis testified that the 
Foreign Intelligence Services of multiple countries 
actively seek information contained in the SIGACTS and 
would pay for SIGACTS from the CIDNE-I rack database. 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



26 

The Foreign Intelligence Services seek 
information pertaining to the United States military 
tactics and procedures which show operational 
strategies, responses to attacks and the units involved 
in TTPs of military operations in Iraq as detailed in 
classified reason number 3. 

Mr. Lewis testified that country 2 would 
pay at least $10,000 for the records in the CIDNE-I 
rack, the SIGACTS in the CIDNE-I rack database, and 
Mr. Lewis called his valuation conservative as set 
forth in classified reason 4 . 

A Foreign Intelligence Service has paid $50 
for documents containing information similar to that 
found in the SIGACT . Mr. Lewis determined that a 
Foreign Intelligence Service would value at least 
10 percent of the SIGACTS from the CIDNE-I database. 

Based on Mr. Lewis' evaluation, the price 
paid per document, the 380,000 records, SIGACTS in the 
CIDNE— I database are worth approximately $1.9 million 
to a Foreign Intelligence Service which is 10 percent 
of $3,850,000 times $50. 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



27 

Your Honor, at this point I'm going to move 
on to the ACIC document which doesn't necessarily — 
doesn't require any classified enclosures to be 
referenced . 

THE JUDGE: Do you request to retrieve them 
and have PFC Manning go back to the table? 

MR. FEIN: Yes, ma'am, I do . So the United 
States requests that I will collect those documents and 
continue . 

Your Honor, United States retrieved 
Appellate Exhibit 617 from the court and PFC Manning 
and Major Hurley. 

Your Honor, the next document, compromised 
document is the ACIC document and this goes to 
specification 1 — excuse me, Your Honor — 1 and 15 
mostly for (inaudible) offense, Your Honor, 
specification 15 Charge 2 . 

Your Honor, the ACIC report is a charge 
document . The declassified version of the document is 
at Prosecution Exhibit 45 and the original classified 
version is at Prosecution Exhibit 46, 45 and 46. 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



28 

Your Honor, the ACIC report provided 
PFC Manning with the actual knowledge that the enemies 
of the United States would use classified information 
obtained from WikiLeaks against the United States and 
knowing that PFC Manning deliberately disclosed this 
document, this document to the world through WikiLeaks. 

Ms . Gwynn testified about the Army 
Counterintelligence Center's process for creating 
intelligence products like self —initiated special 
report charged tier. She also addressed the center's 
meticulous sources program. 

With regard to the report significance, she 
explained the mission of the cyber counterintelligence 
assessments branch where he worked as a senior analyst 
was to identify the specific threats using predictive 
analysis and use work product like the charge ACIC 
document that she explained reflects that objective. 

Your Honor, in this case the 18 March 2008 
report describes in detail what the other research of 
WikiLeaks.org revealed about the nature, operations and 
actions of WikiLeaks in 2008. Its purpose was to 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



29 

assess the counterintelligence threat posed to the 
United States Army by the WikiLeaks website . 

Specifically, the ACIC report analyzes the 
threat posed by WikiLeaks following the release of the 
U.S. Army table of equipment in Iraq and Afghanistan 
from April 2007 and the release of other classified 
U.S. government information . 

The report ' s key judgments communicate 
three main points, Your Honor. That WikiLeaks 
represents potential force protection 

counterintelligence OPSEC and INFOSEC threat to U.S. 
Army, pages 3 and 4 Prosecution Exhibit 45. 

Recent unauthorized releases of DoD 
sensitive and classified information provide Foreign 
Intelligence Services, foreign terrorist groups and 
other adversaries with potential actionable information 
for targeting U.S. forces. 

And WikiLeaks most likely has other DoD 
sensitive classified information in its possession and 
will continue to post it on their website. 

Your Honor, the ACIC report goes on to 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



30 

discuss DoD classified information that WikiLeaks had 
released in the past and how WikiLeaks posts all 
information that it received without editorial 
oversight . 

The basic report concludes that and 
PFC Manning knew that it must also be presumed that 
foreign adversaries will review and assess any DoD 
sensitive or classified information posted to that 
website . 

The document warned readers of adversaries ' 
increased ability to complete rapid data compilations 
to more efficiently develop actionable information, 
intelligence collection, planning or targeting purposes 
against the United States . 

That's on page 21, Your Honor, of 
Prosecution Exhibit 45 . 

So you'll see, Your Honor, that this charge 
document serves as another warning to PFC Manning as to 
the dangers of posting information on the internet 
generally and once more on WikiLeaks specifically. 

Given the accused's experience with the 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



31 

classified information of classified documents and the 
types of information contained in that report as well 
as its markings, the accused knew that the unauthorized 
release of that single report itself could cause 
serious damage to national security. 

As you heard from Ms. Gwynn, the ACIC 
document is only available on SIPRNET. At the time it 
was taken from the U.S. Government or on (inaudible) 
and transmitted to WikiLeaks and ultimately posted to 
the internet . 

The report was marked secret at the top and 
bottom of each of the 32 pages which (inaudible) to 
PFC Manning that it was a classified information and 
should be treated as such . 

Your Honor, Prosecution Exhibit 181 Alpha, 
181 Alpha is the classified stipulation expected 
testimony for the original classification authority of 
that document and it further explains why the ACIC 
report is national defense information and was properly 
classified at the secret level. Prosecution Exhibit 
181 Alpha. 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



32 

Your Honor, Prosecution Exhibit 84 is a 
summary of the Intelink logs produced by Special Agent 
Shaver to annotate the exact time PFC Manning 
downloaded this document and viewed the ACIC document 
for Intel . 

This shows PFC Manning accessed the web 
page that contained the document dot ASP version and 
the document version, that's the Microsoft Office 
document, the DOC version of the ACIC report on 29 
December 2009, 14 February 2010, 1 March 2010, and all 
that from his dot 40 SIPRNET computer. 

Your Honor, Mr. Arteli, the ACIC website 
administrator, he testified that Prosecution Exhibit 
63, an IP address associated with PFC Manning accessed 
the ACIC website containing the ACIC report on 1 
December 2009 and subsequently on 29 December, 1 March 
and 7 March . 

Mr. Chamberlain testified that the IP 
address addresses dot 22 and dot 40 accessed ACIC 
server 114 times beginning on 19 November 2009 and that 
is reflected in the server logs, Prosecution Exhibit 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



33 



64 . 

THE JUDGE : How many times did you say? 

MR. FEIN: Your Honor, 114 times beginning 
on 19 November 2009 which is essentially within a few 
days of PFC Manning having access to SIPRNET without a 
soldier to his left or right during RIP/TOA. 

Your Honor, the first time the United 
States can prove PFC Manning viewed the ACIC report was 
on 1 December although he accessed the website on 19 
November. PFC Manning was on the ACIC website viewing 
that document weeks before Christmas Eve of 2009. 

Your Honor, what did PFC Manning do after 
reading the ACIC document, ignoring the warnings 
enumerated in the document and then compromise the ACIC 
document to WikiLeaks . He obsessively followed its 
release and (inaudible) in the amount of press the 
release was receiving. 

And in the Assange chat PFC Manning makes 
clear his need to monitor the attention his actions 
were receiving . 

PFC Manning told Julian Assange that a US 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



34 

Government official, Lieutenant Colonel Packnett, 
confirmed the authenticity of the ACIC reports to the 
New York Times laughing this action is contravention of 
the typical policy to protect classified information by 
neither confirming or denying the authenticity of 
classified information. 

Your Honor, that's clearly stated in the 
Assange chats page 13 . 

Your Honor, the accused repeatedly searched 
cables on WikiLeaks . He repeatedly accessed it and 
ultimately disclosed it to WikiLeaks . The intelligence 
report relates to national defense discussing 
specifically our vulnerabilities to WikiLeaks and the 
terrorist organizations their actions aid. 

This document was classified and not 
released publicly until PFC Manning took it upon 
himself to unilaterally decide the world, including the 
enemies of this country, should receive it . 

Your Honor, the next charged document is 
the Apache video. This is specification 2 of charge 2. 

Though edited by WikiLeaks and PFC Manning 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



35 

for release, the video is compromised by PFC Manning 
with over 38 minutes of footage from United States to 
the Apache helicopter. 

Ultimately, the WikiLeaks was posted to the 
world on 5—8—2010, to the activist organization on 15 
February 2010. 

With regard to the content of the video, 
Your Honor, you heard primarily from Chief Warrant 
Officer 5 John LaRue has been an Apache helicopter 
pilot more than quarter of a century flying Apache 
helicopters. (Inaudible) depicts the display of the 
Apache helicopter . 

He shows the angles of depicts how pilots 
use technology on aircraft and exposes our use of laser 
technology to obtain key metrics . 

Overall, the video documents the actions 
and experiences of U.S. service members conducting a 
wartime mission. 

With regard to the manner in which the 
video is treated, Chief LaRue testified that the 
footage contains a sort of information preserved to 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



36 

facilitate lessons learned by our aviation community 
and that protected from compromise by placement on 
SIPRNET system. 

The information is reviewed and sanitized 
prior to any potential public release. Although the 
Apache video is classified, it ' s sensitive . 

The senior pilot testified that this 
information is the same type he had been taught and 
himself teaches never to release . 

Why is that, Your Honor? 

As Chief LaRue explained, this information 
benefits our adversaries by communicating our tactics, 
techniques and procedures and informing them on the 
limitations of the U.S. government's technology. 

Your Honor, the defense would have you 
believe that a verbatim transcript of the incident had 
already been made public and this somehow showed the 
video wasn't closely held and excuses the accused's 
conduct . This United States myth is actually a red 
herring . 

Just as purported state cables contain 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



37 

topics also addressed in open source material, so is 
true the incident depicted in the charged video was no 
secret . 

However, just like every other piece of 
protected U.S. government material in this case, at no 
point was the entirety of this video officially 
released and no point were images made public and no 
point was the TTP information contained disclosed. 
Even the book itself didn't describe the weapons or 
engagement response . 

Moreover, the transcript in the Finkel book 
is not actually verbatim although the portions are 
similar. There's been no evidence that the embedded 
journalist ever saw the video, and the author mentions 
the sensitivity of protecting the sources and methods 
from which the content is derived, the content of his 
book . 

What ' s more is that based especially AIT 
and on— the— job training already discussed, PFC Manning 
knew the value of the video to the enemy as well as the 
need to protect the information it contained. 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



38 

Disregarding the sensitivity of this 
material, PFC Manning thought the video was cool and 
decided to release it to a bunch of anti-government 
activists and anarchists to achieve a maximum exposure, 
the maximum exposure and advance his personal quest for 
notoriety . 

Ultimately, this video is released by 
WikiLeaks, yet PFC Manning's involvement in this tale 
and the compromised region as far back the December of 
the previous year. PFC Manning saw, researched, 
released and then assisted in doctoring the video for 
maximum impact, all notwithstanding his understanding 
of the nature of the material . 

PFC Manning first saw the video in December 
of 2009 with soldiers in unit. Ms. Showman, Captain 
Fulton, Chief Balonek all testified that the video was 
located on the unit SIPRNET, their SIPRNET share drive. 

This drive Captain Cherepko testified was 
acceptable to any individuals with appropriate 
clearance such as PFC Manning and his analyst 
colleagues . 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



39 

Your Honor, 22 January 2010, 22 
January 2010, PFC Manning left Iraq for his R and R 
leave . During this time he erased his computer in 
order to destroy any evidence regarding the Gharani 
video and the CIDNE databases, the SIGACTS portions of 
the CIDNE databases . 

By this point, Your Honor, in 22 January 
2010, PFC Manning realized that his previous Gharani 
leak would not be released any time soon because it was 
encrypted. This reality was essentially utterly 
unsatisfactory to them. 

Through researching the event, PFC Manning 
released the Apache incident had been subject to a FOIA 
quest . This Apache video was his opportunity to and 
therefore would be his next target . 

PFC Manning, returning to theater on 14 
February 2010, less than 24 hours later on 15 
February 2010 he burned the Apache footage and its 
associated documents onto a disk from his SIPRNET D6— A 
computer and he took that material out of the T— SCIF to 
his shoe where he loaded into his personal McNamara 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



40 

computer uploaded 20 WikiLeaks . 

That video, along with the Reykjavik 13 
learn cable and (inaudible) , Your Honor, this is shown 
by the forensic evidence. 

Prosecution Exhibit 127 is the volume dot 
TXT document line 1, line 1 on PE127 shows the Apache 
file name which was the same name he used for the file 
in the disk found in his shoe at the time of his 
arrest . 

However, Your Honor, compromising Apache 
video to WikiLeaks wasn ' t going to be enough for 
PFC Manning. The entire video would not make the 
splash he wanted and garner the attention he craved. 

PFC Manning didn't get the reaction he 
desperately wanted from that Gharani video . It 
couldn ' t be released because WikiLeaks didn ' t have the 
password. This meant that PFC Manning was deprived the 
notoriety his actions deserved. 

If WikiLeaks didn't make the press, how 
could he be the one that hailed the source . 
PFC Manning wanted to make sure this video, this video 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



41 

that the day after he got back from R and R made the 
biggest splash and it received the most attention. 

So accordingly, Your Honor, PFC Manning 
ultimately participated in editing the video which 
would later be released by WikiLeaks under the name of 
"Collateral Murder." 

Your Honor, this is Prosecution Exhibit 41. 
Page 1 an e-mail between PFC Manning and Mr . Schmidle . 

Note, please, Your Honor, that PFC Manning 
credits himself in this e-mail with, quote, approving 
the edits and instructing the quotation inclusion. 

Paragraph one of his own e-mail . I approve 
the edits without actually viewing the video, had a 
written description. 

Then he talks about instructing the, well, 
quote, paragraph 3. You should note too, Your Honor, 
the hypocrisy for professing all the information needed 
to be public, PFC Manning did not seek to release the 
whole video but rather an edited version to maximize 
impact . 

And instead of leading the people he wanted 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



42 

so much to have the information, free to assess it . 
There should be no transmitted. The only thing — 

(Whereupon, there were announcements in the 
media room interrupting audio . ) 

MR. FEIN: Your Honor, these are not the 
actions of a naive person stumbling onto something he 
thought should be made public. Instead, this a capable 
soldier being trained with his experience regarding the 
enemy's priorities and resources and with an agenda, 
Your Honor, he's a soldier that can't live on his 
skills, training and access for his own personal gain. 
He put himself before his country even with this video, 
Your Honor . 

Virtually each click of his mouse on 
SIPRNET was motivated by his request for the biggest 
impact and the widest notoriety. With the editing of 
the Apache helicopter video, he knew he would get a 
reaction. Over and over he conducted open source, he 
(inaudible) . 

First, Your Honor, PFC Manning conducted 
searches for Reuters, Apache helicopter video related 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



43 

items 51 times, 51 times in 36 days between March and 
April of 2010. This is all in the Intel link search 
summary, Prosecution Exhibit 81, lines 534 through 668, 
534 through 668. 

THE JUDGE: That's Prosecution what? 

MR. FEIN: 81, Your Honor, Intelink search 

logs . 

PFC Manning used search to search open 
source articles on the SIPRNET system 61 times. He 
also edited the collateral one murder video on his dot 
source computer . 

In an effort to obtain immediate notoriety, 
although in a clandestined form PFC Manning brought to 
the attention of Captain Fulton who compared the link 
share drive video to verify a match noting her 
reaction, he burned the souvenir copy three days later. 

Then in May PFC Manning discussed via 
e-mail his role in editing that video as you saw a 
moment ago to Mr . Schmidle saying he was glad it made 
an impact in connecting it to the CIDNE actual reports 
of the SIGACTS. 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



44 

Finally, PFC Manning's own aunt testified 
that PFC Manning asked her to post the edited version 
on his Facebook account after being confined. 

The theme here is PFC Manning's consistent 
cavalier attitude towards this material . Manning knew 
the importance of the information and that it was only 
available on SIPRNET. 

He even thought it was classified. So 
based on his knowledge, training and experience, he 
knew it was not publicly available . 

Ms. Scott, the chief of FOIA and privacy 
section for U.S. CENTCOM, she testified while the 
investigation has been released to the public through 
FOIA, this specific video was not released. 

At every turn, Your Honor, PFC Manning's 
handling and treatment of this video has been a 
violation of the United States . 

PFC Manning copied what later determined to 
be an unclassified video, took to his room for 
unclassified use to (inaudible) what he thought was an 
intelligence (inaudible) . 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



45 

Your Honor, he took these deliberate steps 
even when the book he talked about in these chats, self 
claimed measuring stick for this disclosure revealed 
the author had not released the entire video transcript 
and did not release any images from the video itself, 
and it deliberately protected sources and methods 
within his own book, page 285, and Prosecution Exhibit 
186. 

Your Honor, the next section, password 
cracking, specification 1 charge 3. You've heard — 
THE JUDGE: What? 

MR. FEIN: I'm sorry. Specification 1, 
Your Honor, of charge 3. 

THE JUDGE: Okay. 

MR. FEIN: Your Honor, you've heard 
overwhelming evidence that PFC Manning started using 
his access to SIPRNET less than two weeks after 
starting work in the SCIF at FOB Hammer. 

By March 2010, the accused stole and 
transmitted over 20,000 documents and watched the 
world's reaction to the cables released. 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



46 

One of the topics the United States did not 
highlight were some of the things PFC Manning conducted 
on SIPRNET related to obfuscating his internet 
activity . 

Between 6 December '09 and 8 March 2010, 
PFC Manning searched 19 times on SIPRNET for terms such 
as encryption, and that's what PFC Manning described to 
Ms . McNamara as encryption that has gone 12 years not 
being broken in his chats. And MD5, which is an 
algorithm for hashing files . 

Then, on 8 March 2010 at 22:28, so 
10:28 p.m., PFC Manning used his access to SIPRNET to 
search for rainbow tables — 

THE JUDGE: What date was that? 

MR. FEIN: Ma'am, that's on 8 March 2010, 
at 22:28:21 seconds. More importantly, Your Honor, 
it's line 417 of Prosecution Exhibit 81. Line 417 
Prosecution Exhibit 81 . 

That search was for rainbow tables . Why 
would PFC Manning be doing research on rainbow tables . 
It ' s pretty obvious when you put the pieces together 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



47 

and gets to the heart of Specification 1 of charge 3. 

We know that PFC Manning was obsessed with 
covering his own tracks . We know this from his 
personal Mac information erasure on 31 January 2010. 
He performed a 7-pass erase of his computer, not just 
one. These facts join a host of others which evidence 
PFC Manning's interest in hiding his transgressions. 

He used other people's user accounts and he 
changed the default setting on his dot 22 internet 
browser to refrain from capturing internet search 
history . 

But at some point, Your Honor, at some 
point, it occurred to PFC Manning that there might be a 
chance that his activity was being captured by audit 
systems on the SIPRNET. 

It was easier to obfuscate what he was 
doing on his own machine, but not as easy on the 
SIPRNET. And, in fact, we know that it was a concern 
of his from his chats with Julian Assange. 

Your Honor, on page 3, Prosecution Exhibit 
123, Assange chats, PFC Manning said ha, I'm all over 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



48 

the place, clearing logs, not logging at all, safe, I 
just wanted to be certain. And this was on 6 
March 2010, talking about clearing logs. So, again, 
why search on Intel link for something called rainbow 
tables on 8 March 2010. 

PFC Manning SIPRNET computers had a local 
user named FTP user on the account . You heard from 
Special Agent Shaver that the FTP user, the user name 
was a user account on the D6— A SIPRNET computers and 
was not attributable to any particular person or user. 

It was an account that would store files 
without any tie to the actual user behind the keyboard. 

It was an account where one could store 
programs like Wget within the profile my documents and 
not have any tie to the ultimate user behind the 
keyboard. It's an account one could search the SIPRNET 
and get closely held information without any tie to the 
actual user behind the keyboard. 

In short, Your Honor, having access to the 
FTP user account could effectively anonymize 
PFC Manning behind the keys of the dot 22 and dot 4 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



49 



SIPRNET computers. 

Fortunately for the United States, the 
PFC Manning's attempts to gain access to the FPT user 
account would fail despite from the assistance from 
Julian Assange and WikiLeaks . 

Special Agent Shaver testified that 
Microsoft Windows has multiple ways to protect 
passwords . 

First, instead of storing the actual 
password in plain text, the actual words of the 
password, the letters and numbers, Windows converts it 
to a unique hash value and that ' s called the LM hash . 
LM hash. And it uses a complicated mathematical 
algorithm to prevent what Special Agent Shaver called 
bad people from obtaining passwords . 

Second, Your Honor, Windows, Microsoft 
Windows splits that algorithm into two pieces, storing 
one in the computer's system file and one in the 
computer's SAM file, system file and SAM file. 

Finally, Windows, the last layer of 
protection that Windows provides is that it locks down 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



50 

these two files, the system file and SAM file. It 
locks them down so no user except an administrator can 
actually access the content of those files . 

Your Honor, no, he did not have 
administrative privileges . PFC Manning resorted to the 
most effective method of circumventing the sort system 
on his SIPRNET computer. He decided to bypass all of 
Microsoft Windows, the entire operating system of 
Windows to access the security information on the 
computer . 

He did that knowing the protection 
Microsoft Windows has on the SAM and system files. 

Special Agent Shaver testified that if the 
user was to boot their computer using a CD that was 
configured to run another operating system, that user 
could navigate to the SAM file or system file on the 
hard drive and view its contents because that's doing 
it outside of Windows. 

One such operating system is Linux. 
Special Agent Shaver testified that a knowledgeable 
person could download a copy of Linux free from the 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



51 

internet and create a bootable version of the operating 
system, a rescue disk that could be installed on a CD 
and that installation program is called an ISO. ISO. 

Special Agent Shaver testified that an ISO 
is an image. It's an image file of the CD, a copy of a 
CD. 

Your Honor, Special Agent Shaver testified 
that PFC Manning downloaded a Linux install, excuse me, 
rescue disk ISO multiple times and specifically on 2 
March 2010 at 17:48:51 hours, 17:48:51. 

He burned that Linux system operating, that 
Linux — excuse me — rescue disk operating system ISO 
to a CD on his personal map. 

Your Honor, note Prosecution Exhibit 125. 
Prosecution Exhibit 125 is the disk utility log for 
PFC Manning's personal Mac and specifically lines 365 
through 382 . 

THE JUDGE: That exhibit was what? 

MR. FEIN: 125, and it's lines 365 through 
382 . This disk utility log from the personal Mac shows 
PFC Manning burning that Linux ISO to a disk. 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



52 

You recall, Your Honor, that Special Agent 
Shaver actually used the exact same Linux ISO to view 
the folder contents that PFC Manning would have. The 
only way Special Agent Shaver explained that one could 
potentially obtain access to the SAM and system files 
was to boot the computer using this Linux operating 
system CD . 

Now, Your Honor, you heard from Mr. Weaver, 
one of the primary authors of AR25— 2, that under 25—2 
bypassing includes finding capabilities that elevate 
the user's privileges. 

He explained that traditionally bypassing 
means someone installed or modified a system in order 
to gain access in an unauthorized way, and this is 
exactly what PFC Manning did or at least attempted to 
do. 

By equipping himself with Linux, a 
different operating system and booting the government 
SIPRNET D6-A computer using that CD, PFC Manning 
attempted to bypass and did actually bypass a network 
security system in order to obtain a security data. 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



53 

Specifically, PFC Manning breached built— in 
security features within Microsoft Windows, the Army's 
approved operating system, on his D6-A computer that 
protected the FTP user account . He wanted the account 
log-in credentials to conceal his identity to continue 
abusing access to SIPRNET and classified information. 

Special Agent Shaver testified that 
PFC Manning successfully obtained a portion of LM hash 
value for the FTP user account from his SIPRNET 
computer. And with that portion of the LM hash value 
in his hand, PFC Manning wanted a way to speed up 
cracking and decrypting the passwords for the FTP user 
account . So he turned to his two trusty sources for 
information, WikiLeaks and Intel link. 

Your Honor, you'll see on page 6 of 
Prosecution Exhibit 123, these are the Assange chats, 
page 6. That on 8 March between 15:55 and 16:11 on 8 
March between 15:55 and 16:11 PFC Manning chatted with 
Julian Assange and WikiLeaks and provided a hash value 
obtained from his SIPRNET computer SAM file. 

With the direct assistance of Julian 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



54 

Assange and WikiLeaks, PFC Manning attempted to reverse 
engineer the password for FTP user. 

Your Honor, print 130, going back to a key 
piece of evidence in this case, is the summary created 
by Special Agent Shaver. 

Your Honor, when you deliberate you'll have 
Prosecution Exhibit 130. Your Honor, with the direct 
assistance of JA WikiLeaks, he attempted to get the 
password. 

Your Honor, take a look (inaudible) . 

On the top you have the extract from 
Prosecution Exhibit 123 the Assange chat. 

On the bottom you have the EnCase forensic 
pole of what PFC Manning called and Special Agent 
Shaver testified a hex dot. 

Special Agent Shaver created this summary 
showing PFC Manning's chatting with Julian Assange and 
the extract from the dot 22 SAM file. You can see the 
FTP user on the right side of the SAM file. 

Your Honor, on the bottom right, FTP user 
shows up in that SAM file . And then following that is 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



55 

the hashed algorithm. The hashed algorithm, Your 
Honor, is the 80C1049 all the way to the 351C . It's in 
a black bold on the left side of the FTP user. 

He also testified that he conducted a 
process called a hex dump which converted the 
information on the SAM file to a hash value. On the 
left. Excuse me, Your Honor. On the left side is 
called the hex dump . 

The reason that's important, if you look at 
the chats you will see that PFC Manning said at 1609 to 
Julian Assange, not even sure if that's the hash. I 
had to hex dump a SAM file since I don't have the 
system file. 

And Special Agent Shaver, using EnCase 
forensics software, did the exact same process. As you 
can see, Your Honor, in black at the bottom left is 
that 80 number I just read. 

Little difficult to see on these 
projections, Your Honor. It's clear on the document, 
Prosecution Exhibit 130. 

And at the top of the chat, Your Honor, 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



56 

PFC Manning inquires about KN hash cracking. Upon 
hearing about the rainbow table resource, he provides 
the partial hash values, confirming it's a SAM file 
origins . 

What I mean by that is that that 80C1 
number that is on the bottom left was provided by PFC 
Manning in his chats to receive assistance by Julian 
Assange in cracking his SIPRNET computer, the FTP user 
account information. 

Your Honor, at 16:11:26 on 8 March 2010, 
within these chats as annotated here on PE130, Julian 
Assange responded that WikiLeaks, that is LM hash guide 
will handle, will pass it to his LM hash guide. That's 
on the second from the bottom from the right side. 

Please note, Your Honor, that this chat 
occurred by PFC Manning was off shift, and in his CHU 
on his personal Mac, and this was at 16:11. Shift 
change occurred every day at 2200 just shy of 30 
minutes at 22:28. 

PFC Manning used his SIPRNET access to 
search for rainbow tables and Special Agent Shaver 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



57 

testified that rainbow tables are used, are tables that 
are used in order to find known hash values for 
passwords if a known password in plain text converts to 
a known hash value . Fast way to quickly determine what 
that password is . 

PFC Manning went to SIPRNET in order to 
figure out if he could find a rainbow table and he 
could not, but for six hours after he chatted with 
Julian Assange in order to find a way to get the FTP 
user account information, luckily for the United States 
PFC Manning did not find what he was looking for. 

The accused successfully breached security 
protocols and obtained the portion of the hash value in 
the SAM file. 

PFC Manning knew what to do in order to 
bypass the computer protocol and specifically, that is, 
specifically designed to protect the password 
information and he took deliberate steps to circumvent 
those protections by using a Linux rescue CD. 

He violated regulation two ways. First, by 
booting the SIPRNET computer using a different 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



58 

operating system, bypassed the security information 
security mechanism, the use of user name and password 
to gain access. 

Special Agent Shaver, a normal user, did 
not have access to a file . You could only gain it by 
booting from a CD. 

Second, by navigating the SAM file and 
obtaining part of the hash value of the password to the 
FTP user account, PFC Manning attempted to bypass the 
security mechanism in place . 

Using Julian Assange and WikiLeaks, 
PFC Manning tried to figure out the password to another 
local user on his SIPRNET computer, one he did not 
normally have access to in the course of his work, so 
he could hide in plain sight and not operate under the 
potential fear of being caught . 

Your Honor, I don't know if now is a good 
time to take a recess or I can keep going. 

THE JUDGE: It probably is. 15 minutes. 

MR. FEIN: Yes, ma'am. 

THE JUDGE: Court is in recess for 15 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



59 



minutes . 

(Court in recess.) 

THE COURT: Court is called to order. Let 
the record reflect all parties present when the court 
last recessed are again present in THE court. 

Major Fein? 

MR. FEIN: Your Honor, the next dataset are 
the GTMO documents, Specification 9. 

Your Honor, the next set are the GTMO 
documents that serve as a basis for Specification 8 and 
9 in Charge 2 and also, Your Honor, Specification 2 of 
Charge 3. Detainee Assessments Briefs, or DABs . 

(Inaudible) PFC Manning researched GTMO 
information repeatedly on Intelink . He found the DABs 
in classified network and reviewed them. 

He then discussed their contents with 
Julian Assange before exporting all the records in the 
database by using Wget, unauthorized program. 

Even after PFC Manning stole them he 
couldn ' t stop talking about them with Adrian Lamo . It 
shows that he was looking to get the information 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



60 

published with WikiLeaks from the beginning of his 
deployment . 

He was looking for politically notable 
information that would garner as much attention as 
Reykjavik 13 did in February 2010. 

Using the tools provided by him in the 
United States to analyze intelligence, PFC Manning 
searched for information that compromised to WikiLeaks 
when he found the GTMO DABs, detainee assessment 
briefs . 

Your Honor, what are DABs? DABs are a 
recommendation to the US SOUTHCOM commander for the 
disposition of detainees, which included the detainee's 
threat level and intelligence value to the United 
States . 

The DABs contain classified information 
pertaining to United States intelligence regarding 
terrorists and their organizations and classified 
information about terrorist training, TTPs, and 
intelligence analysts of terrorist organizations . 

Furthermore, Your Honor, the DABs 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



61 

demonstrate the US intelligence gaps with terrorists 
and terrorist organizations and the extent of 
cooperation with the United States . 

Rear Admiral David Woods testified as the 
OCA for the DABs that compromising the DABs could cause 
serious damage to National Security and thus they are 
classified at the secret level. 

THE COURT: Who was the person? 

MR. FEIN: Rear Admiral David Woods, the 
previous demander of JTF GTMO . 

The DABs are housed in three locations, all 
of which are classified. 

Mr. Moats, Your Honor, he testified as a 
head of the DAB branch that the DABs are stored locally 
on the GTMO share drive on SIPRNET, on the JDIMS-I, a 
unique system for the JTF GTMO, and also on SIPRNET on 
Intellipedia . 

Mr. Moats testified that the DABs are 
stored by document ID number and a user can see the 
document ID number by scrolling over the link for each 
DAB on Intellipedia web page. 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



62 

Your Honor, on 8 December 2009 PFC Manning 
first accessed the DAB website. 

On 5 March — 

THE COURT: What was the date? 
MR. FEIN: 8 December, 2009. 

Your Honor, 5 March 2010, the Intelink logs 
show that he attempted to download the entire database 
but could not complete that download. Prosecution 
Exhibit 82 shows PFC Manning's manual attempts to 
collect the DABs . 

Special Agent Shaver testified that PFC 
Manning started downloading DABs using the right click 
save method, as an ordinary user would on 5 March 2010. 
And Special Agent Shaver testified that the right click 
method was slow and wrought with errors . 

THE COURT: Exhibit 82? 

MR. FEIN: Your Honor, Prosecution Exhibit 
82 is an extract of the Intelink log activity for 5 
March 2010, Your Honor, line 4 of Prosecution Exhibit 
82 shows PFC Manning's attempt to download one DAB at 
3:22 . 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



63 

Why is this important, Your Honor? 

Because the summary shows that PFC Manning 
failed in this attempt because on the Intelink log data 
there's a 000 code at the end of the actual web 
address, 000 code. Again Prosecution Exhibit 82. 

Special Agent Shaver testified that the 000 
code signified that the download did not go through. 
It was not complete . 

A minute later PFC Manning successfully 
downloaded the same data. Special Agent Shaver also 
explained in a attempt that was successful a download 
was successful if the code 200 showed up next to the 
web address. So 000 failure; 200 complete. 

On just the first page of Prosecution 
Exhibit 82 there are 23 attempts to download DABs, 12 
attempts were not successful with 000 code. 

In order to get 11 successful downloads PFC 
Manning spent approximately 7 minutes according to the 
Prosecution Exhibit 82, Your Honor, in order to 
increase the (inaudible) , PFC Manning turned to an 
unauthorized program, Wget . 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



64 

Special Agent Shaver testified that 
Prosecution Exhibit 157 shows PFC Manning searching for 
information on how to make Wget run faster and that was 
on 7 March 2010. 

Special Agent Shaver testified that PFC 
Manning began running Wget from dot 22 computer system 
on 7 March 2010 the first time and PFC Manning 
introduced that software onto his classified computer 
in order to do that . 

Your Honor, the unit AUP, authorized user 
for which Captain Tripp (inaudible) will remember 
testified prohibited soldiers from executable code 
which specifically includes dot EXE files to a DoD 
computer . 

And you'll remember from the testimony 
Special Agent Shaver, Your Honor, dot EXE files are 
executable files . 

Programs downloading the unauthorized Wget 
EXE file violated AR25-2 paragraph 4-582 as detailed in 
Specification 2 of Charge 3 . 

As Special Agent Shaver testified PFC 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



65 

Manning, after downloading Wget dot EXE, had to program 
Wget, how to operate Wget, did not have a graphical 
user interface or GUI, therefore it was not as simple 
as double clicking an icon of an installed program on 
the D6— A computer and running it . 

Your Honor, explained here is Prosecution 
Exhibit 189, page 1. This is the help file Special 
Agent Shaver testified he extracted from PFC Manning's 
computer. When I type in Wget— H, this help file 
displays in an MS dot prompt . Because Wget is a 
command line tool, it has many options as displayed on 
page 1 here . 

PFC Manning had to research how to program 
Wget and how to program it in order to harvest the 
entirety of US SOUTHCOM database of DABs . PFC Manning 
used the document ID number, the unique database 
identifier in Wget to extract those DABs. 

Your Honor, PFC Manning was able to 
download the database in less than four hours once he 
was able to get Wget running, whereas his manual 
attempt on 5 March had been plagued with errors . PFC 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



66 

Manning's success rate with Wget on 7 March was much 
better . 

Mr. Johnson testified that while PFC 
Manning was harvesting those DABs , he also was talking 
to Julian Assange through his chats and he recorded 
that information. 

Your Honor, PFC Manning and Julian Assange 
discussed the value of the DABs, the types of 
information in the DABs, and the status of the uploads. 

That is in the Assange chats pages 3 
through 5 . Pages 3 through 5 . 

Two months after stealing the DABs, PFC 
Manning bragged, telling Mr. Lamo that, oh, the JTF 
GTMO papers Assange has those, too. PFC Manning went 
so far as to characterize the DABs as a highlight on 
the information he stole. 

On 25 April 2011, WikiLeaks released 
purported DABs on their website. Prosecution Exhibit 
95 are the charged DABs in this case . 

Your Honor, Prosecution Exhibit 95 showed 
that the DABs are marked secret on the top and bottom 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



67 

of each page. WikiLeaks published the DABs because 
they had not been publicly released at that point and 
the information in the DABs was not available anywhere 
else . 

The evidence from all the witnesses 
indicated that the documents were closely-held. 

As a defense's witness Colonel Retired 
Davis testified Defense Exhibit Victor, which is a DAB, 
was not necessarily useful to a prosecutor who needed 
the underlying evidence but Defense Exhibit Victor was 
an executive summary of that evidence and the 
intelligence reporting contained little public 
information . 

When PFC Manning extracted the DABs to his 
personal computer, he completed the (inaudible) of 
those records . The DABs that were stored on the 
classified system with only authorized personnel with a 
need— to— know could access them. At no time, Your 
Honor, was PFC Manning authorized to house those 
records on his personal laptop. 

Furthermore, Your Honor, PFC Manning 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



68 

converted the information in the DABs when he conveyed 
them to WikiLeaks for publication. 

PFC Manning specifically intended for the 
DABs to be published and WikiLeaks obliged. 

The United States devoted significant 
resources to protect the classified information in DABs 
from actual compromise . 

Mr. Lewis testified that foreign 
intelligence services will pay for the information 
precisely because its exclusive possession provides a 
significant benefit to the United States. 

The publication of the DABs completely 
deprived the United States of the exclusive possession 
of the use of that information, exclusive use. 

Accordingly, Your Honor, by causing the 
DABs to be published, PFC Manning substantially 
interfered with the United States ' ownership rights in 
those records . 

Using Wget he scraped an entire classified 
website. PFC Manning then placed the exported 
classified records on his personal computer. After 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



69 

transferring the records to the personal computer he 
talked about GTMO records with Julian Assange, as I 
described before, as he delivered them to their web 
sites online submission program. 

Your Honor, in the end, PFC Manning felt 
the GTMO documents were the highlight and were among 
many records he admitted to stealing. 

Mr. Moats testified that each DAB, as the 
chief of the DAB branch, was the product of 80 to 90 
hours of work by intelligence professionals, each DAB, 
Your Honor. And Mr. Moats testified that the lowest 
ranking person that worked on the DAB creation had the 
grade of E4 . A specialist of the United States Army in 
2005, a specialist or E4, earned $1,500 approximately 
per month in base salary . 

Assuming 4 hours per week, that works out 
to an hourly wage of about $9, Your Honor. 

PFC Manning stole over 7 00 detainee 
assessments. Mr. Moats testified that each DAB took 
approximately 80 hours of work, thus 56,000 hours were 
spent creating those DABs . Therefore, the cost to 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



70 

create the DABs was at a minimum $525,000 which is 
based off 56, 000 hours at the lowest grade of a 
producer of the DABs at $9.39 per hour. 

Your Honor, additionally, DABs are valuable 
to foreign intelligence services . 

Your Honor, at this time United States 
requests that the accused and Major Hurley relocate to 
the witness box and I will hand Appellate Exhibit 617 
to the Court and the Defense . 

Your Honor, Mr. Lewis testified that the 
foreign intelligence services in multiple countries 
actively seek information contained in DABs and would 
pay for DABs for the US SOUTHCOM database . 

The foreign intelligence services seek 
information pertaining to GTMO counterterrorism efforts 
as detailed in Classified Reason Number 7 . 

Mr. Lewis testified that country 4 would 
pay over $7,000 for the records in the US SOUTHCOM 
database and Mr. Lewis called the valuation 
conservative as set forth in Classified Reason Number 
8 . 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



71 

Your Honor, I'm going to transition over to 
the two OJ documents that service the charged documents 
for Specification 3 of Charge 2, and if I may request 
that PFC Manning and Major Hurley stay in their current 
position with the classified documents for the 
beginning . 

Your Honor, PFC Manning knowingly 
compromised the documents belonging to United States 
intelligence agency that makes up Specification 3 of 
Charge 2 . 

I will generally discuss in this open 
session the proof the United States presented for the 
OJ information, however the United States primarily 
refers the Court to specific — to the top portion of 
Appellate Exhibit 617 before I continue as that is a 
classified legend for the remaining portion of this 
argument . 

THE COURT: Okay. 

MR. FEIN: Your Honor, the United States 
does not intend to specifically reference any of that 
information again at this point so the United States 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



72 

request that PFC Manning and Major Hurley relocate and 
we could retrieve Appellate Exhibit 617 . 

Your Honor, the charged memoranda were 
published on US official website on the dates dated in 
print 1807 paragraphs 14 and 16. Prosecution Exhibit 
180 paragraph 14 and 16. 

Line 425 of Prosecution Exhibit 81, the 
Intelink search logs, reveals that the accused searched 
for the equity holder of these documents on a SIPRNET 
computer on 9 March 2010. That's line 425 Prosecution 
Exhibit 81 . 

According to the testimony of Special Agent 
Shaver about the specific portion of the file named 
index dot data mining on PFC Manning's dot 22 SIPRNET 
computer, the memoranda were likely present on the dot 
22 computer around March 2010. 

Special Agent Shaver created Prosecution 
Exhibit 154 to show this migration of the file names 
during his closed session testimony. 

THE COURT: What exhibit is that? 

MR. FEIN: Prosecution Exhibit 154. 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



73 

As a reminder, Your Honor, the index dot 
dat file is a file that captures the internet history 
of files moving between web pages and on the computer. 

Special Agent Shaver testified that he 
could tell that the memoranda were on the machine by 
looking at an excerpt of the index dot dat file which 
is a file used, as I just mentioned, to record the web 
sites and files accessed in Microsoft Internet 
Explorer . 

According to Prosecution Exhibit 154, PFC 
Manning downloaded the first memorandum on 17 
March 2010. He saved the first memorandum and the 
second memorandum to his desktop in the Bradley dot 
Manning profile in his My Documents folder on the dot 
22 computer and that was on 21 March 2010. 

Both documents that he download were PDF 
file names very similar to the names of the memorandum. 
All this is reflected in Prosecution Exhibit 154 . 

Special Agent Shaver testified that most 
memorandum were moved to the folder named Blah, 
B— L— A— H, on 22 March 2010. Both memorandum were moved 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



74 

to a folder named "Interesting." The name of the 
folder itself — was — the name was "Interesting" on 
that same day, Your Honor. 

About 30 seconds later, Blah dot zip file 
name was created in Bradley dot Manning's My Documents 
folder . 

According to Mr . Johnson in the volumes dot 
txt document, that's Prosecution Exhibit 127, a file 
named Blah dot zip was placed on the accused's personal 
Macintosh computer on 22 March 2010. 

According to Mr. Johnson, blah dot zip was 
burned from a Windows machine onto a CD at 12 : 55 on 22 
March and that ' s reflected again on Prosecution Exhibit 
127 . 

The charge memoranda, Your Honor, were 
properly marked classified. The memoranda also 
contained national defense information as articulated 
in Prosecution Exhibit 180 Alpha and 181 Alpha. 
Paragraphs 12 through 18. 

Specifically they both contained 
information that concerns intelligence activities, 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



75 

sources and methods and US foreign relations and 
activities such that an authorized disclosure of these 
memoranda, Your Honor, reasonably could be expected to 
harm or cause serious harm to the national defense and 
foreign relations of the United States . 

Prosecution Exhibits 180 and 181 Alpha also 
explained how the information contained in the 
memoranda would be useful to the enemy if released and 
show that the information in the memoranda is true, at 
least in part . 

The dates the memoranda were posted on 
WikiLeaks are recorded in Prosecution Exhibit 180. 
Prosecution Exhibit 180 paragraphs 15 and 20. 

These paragraphs also state that these 
memoranda were never otherwise released outside the 
classified United States Government official channels. 

According to Prosecution Exhibit 141, the 
open source logs for bradass87 between 9 April 2010 and 
13 April 12010, PFC Manning looked at several documents 
on the open source center about the reaction to release 
some of this information. 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



76 

PFC Manning searched for the information on 
the SIPRNET computer. He saved it on his dot 22 
computer . He moved it to his personal Macintosh 
computer and then the memoranda were posted on 
WikiLeaks . 

Later, PFC Manning accessed the information 
to read about the fallout . 

The evidence shows that the accused had 
reason to believe that the information could be used to 
injure the United States to the advantage of a foreign 
nation . 

Your Honor, the next dataset is the 
Net-Centric Diplomacy database and the cables contained 
within. This goes to Specifications 12 and 13 of 
Charge 2 and also Specification 2 of Charge 3 . 

The Net— Centric Diplomacy database contain 
decades of classified closely-held United States cables 
related to foreign policy, including sources of 
intelligence, Your Honor. 

PFC Manning began by compromising a single 
cable, Reykjavik 13 because he thought it would be of 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



77 

interest to join Assange, WikiLeaks, based on its 
subject matter at the time and focus on Iceland. 

PFC Manning was correct . After PFC Manning 
stole the cable and WikiLeaks published it, PFC Manning 
claimed that the affect was a recall of an ambassador. 

Having seen the result of his actions, PFC 
Manning saw an opportunity for more notoriety . 

Thereafter, PFC Manning set about to 
compromise the entire NCD database, Net— Centric 
Diplomacy database . 

Instead of helping his unit, PFC Manning 
took the opportunity to harvest over 250,000 Department 
of State cables for release on WikiLeaks and to the 
world. 

Ms. Tann testified that a cable is an 
official message of the Department of State and cables 
can be sent between posts and the Department of State 
headquarters in DC . 

Ms . Tann testified each cable contained a 
message resource number, which is a unique identifier. 
Cables are used for communicating and conducting United 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



78 



States foreign policy. 

Accordingly, cables are often classified 
and contain sensitive information and information that 
must be closely guarded to enable the United States to 
conduct its foreign policy effectively. 

Your Honor, Prosecution Exhibits 169 
Charlie through 177 Charlie, these are the Charlie 
subexhibits for 169 through 177, these are the charged 
cables, are examples of compromised cables as they 
appear on the Net-Centric Diplomacy database. Each 
cable and NCD contained a warning banner describing the 
limited extent of the user's authorization to view each 
cable . 

Your Honor, Prosecution Exhibits 169 
through 17 8, the Alpha series of all of those, 169 
through 17 8, Department of State officials described 
the contents of the stolen cables . The cables 
contained PII, such as names and the sources of the 
information, as well as the originator of the cable 
itself. 

Using names the cables identified meetings 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



79 

with sources, human rights activists and others at risk 
of incarceration, torture, or death in the country of 
origin . 

The cables also reveal sensitive 
information regarding foreign relations, intelligence 
sources and methods, diplomatic relations and foreign 
policy . 

Special Agent Bettencourt testified that 
the purported cables posted on WikiLeaks . org span 
decades with dates from 1966 up until 2010. 

And Mr. Murphy testified that the charged 
cables, that's again Prosecution Exhibit 169 through 
177 and it's the Charlie series, contained information 
that if compromised could cause harm or serious harm to 
the National Security. He was a duly appointed OCA who 
testified that the cables were either secret or 
confidential . 

Your Honor, why did the Department of State 
create NCD? Ensuring the information and intelligence 
in cables took on increased importance after 
September 11. 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



80 

Mr. Weiss Carter, he testified that acting 
on the need for intelligence sharing the Department of 
Defense providing Department of State funding to make 
it necessary the information available on SIPRNET. 

As a result of that funding, NCD was 
created to share information to all users on SIPRNET. 

Mr. Weiss testified that NCD was a system 
that was specifically designed to provide the 
Department of State in the SIPRNET community with 
access to diplomatic reporting to ensure there was 
information sharing across the Government at all levels 
from priorities to generalities . 

Thus, Mr. Weiss testified that NCD resided 
only on SIPRNET and J links . 

Captain Lim testified that he sent an 
e-mail telling his soldiers that NCD could be used to 
accomplish the mission in the S2 shop. 

Captain Lim testified the 210 mission was 
to train, mentor, advise and assist Iraqi security 
forces in Southeast Baghdad. 

Captain Lim testified that NCD was useful 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



81 

for that mission in Southeast Baghdad but not for 
Iceland, information pertaining to Iceland, South 
America, Asia or the rest of the globe. 

Mr. Madaras testified that he never used 
NCD as a 35 fox because his focus was on the 210 area 
of responsibility and that was in Baghdad. 

PFC Manning's focus should have been on the 
same areas of operation as a shared analyst . 

Your Honor, instead was using NCD to 
accomplish his mission and support his fellow soldiers 
as an all— source intelligence analyst, PFC Manning 
chose to harvest decades worth of SIP disk, SIPR 
distribution cables, to gain his notoriety. 

In his chats with Mr. Lama, PFC Manning 
thought he was smart enough to know what ' s going on in 
the world. 

The day after returning from R and R leave 
and on 15 February 2010 that's when he compromised 
Reykjavik 13 and having observed the results of 
stealing and disseminating that information, PFC 
Manning went to work on reaping more cables . 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



82 

From late February to early March 2010 PFC 
Manning worked on engineering a method to steal the 
entirety of the NCD database . 

Your Honor, note that Mr. Carter testified 
that a user of Net-Centric Diplomacy can only access 
cables through the Net-Centric Diplomacy database web 
page interface on the Department of State web page . 

Mr. Weiss also testified that access to 
cables on Net— Centric Diplomacy was limited because NCD 
allows a user to view through a web browser or print a 
single cable, save a single cable at a time. 

When asked why there ' s no technical 
restrictions put in place on NCD outside of the web 
browser requirement, Mr. Weiss answered that it would 
inhibit sharing of information, be administratively 
difficult to manage, if not impossible. 

Captain Lim also testified that an NCD user 
can access NCD through a website, a user searched for 
cables using key words on the NCD web page . 

He testified it did not have an export 
function similar to what CIDNE had, click a button and 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



83 

export 30 days at a time. And he did not save cables. 
He only read them for information related to his 
mission . 

Your Honor, Special Agent Shaver testified 
that NCD was accessible only through a web page and the 
only way to access a cable was to type in the 
information in the search bar, click search, wait for 
your return to come up on the web page then click the 
specific cable in your web browser and once the cable 
comes back it views in the web browser and at that 
point you can save or print . 

Essentially you're pointing and clicking. 

Mr. Weiss also testified NCD did not allow 
for batch downloading. Using NCD as a normal user, PFC 
Manning never could have accessed let alone downloaded 
over 250,000 cables. 

As Captain Lim and Special Agent Shaver 
testified, NCD only allowed a user to view one cable at 
a time using a web browser to view a web page . This 
was a system limitation that PFC Manning understood and 
had to bypass to accomplish his own personal task. 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



84 

PFC Manning knew he could not physically 
download over a quarter million cables manually with 
NCD's organic functionality typing in 251,000 cables 
into a search bar, clicking on each individual one and 
right clicking to save or print . 

So he turned to what he knew best from his 
experience with the GTMO DABs , Wget . 

And, Your Honor, turning to Wget PFC 
Manning exercised a self— help remedy in order to 
prepare a method for his compromise, or his 
exfiltration as PFC Manning had actually called it in 
his personal tasking order for the GAP . His personal 
tasking order for Department of State information to 
create, as he said to Adrian Lamo, worldwide anarchy. 

Your Honor, that's Prosecution Exhibit 30. 
The Lamo chat, page 9, his goal to create worldwide 
anarchy . 

PFC Manning began by searching for Wget, 
again, prosecution Exhibit 157 shows that PFC Manning 
searched for Wget on his NIPRNET computer and Special 
Agent Shaver testified that the search related to Wget 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



85 

on 7 March 2010 was a search to figure out how to make 
Wget run faster . 

On both 7 March 2010 and 27 March 2010 PFC 
Manning used Google to search for the executable file 
Wget . 

Then, Your Honor, as shown on Prosecution 
Exhibit 157, PFC Manning downloaded Wget onto his 
NIPRNET computer . 

Special Agent Shaver testified that Wget 
was in PFC Manning's users account in March of 2010 and 
introduced again in May of 2010. 

Your Honor, Special Agent Shaver testified 
about Wget . Wget was an executable file that had been 
copied and placed in the My Documents folder on PFC 
Manning's dot 22 SIPRNET computer. 

We know Wget was run from PFC Manning's 
computer because of the PreFetch files, the Microsoft 
Window files that save, say, a slice of the program 
from memory when it runs and that slice includes the 
exact location on the hard drive or, as Special Agent 
Shaver called it the path, the address on the hard 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



86 



drive for which that file ran. 

And each time a different version or each 
time Wget is run from a different location, a different 
PreFetch file is created. 

Your Honor, Prosecution Exhibit 188, 188 
shows the PreFetch files for Wget and all of the 
locations on PFC Manning's computer that he ran Wget. 

Your Honor, it's clear that Wget was not 
run by PFC Manning from a disk . So why did PFC Manning 
have to copy Wget to his computer and run it to obtain 
the state cables? 

This is very simple, Your Honor. 

The Net— Centric Diplomacy database was only 
accessible by using a web browser, opening the web 
page, typing in the search term and clicking the search 
results . 

Then the user had to navigate to the web 
browser, decided which cable he wanted to view, click 
that cable, wait for the cable to load in his web 
browser and once it loaded he would have to decide 
whether to print or save . 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



87 

Your Honor, PFC Manning knew that . And he 
knew the process. That process, the NCD in a D6— A 
computer required was not fast enough or efficient 
enough to afford him the option to harvest over 250,000 
cables in such a short period of time . 

In fact, Mr. Weiss testified, as I 
mentioned earlier, that NCD database did not have a 
function that allowed for mass downloading. So PFC 
Manning did, as I said before what he did best, he used 
Wget to bypass the NCD web page and go directly to the 
web server to scrape all the Department of State cables 
directly from the web server. 

Your Honor, Prosecution Exhibit 187 was the 
demonstrative aid that Special Agent Shaver testified 
about how PFC Manning used Wget . 

Special Agent Shaver testified that PFC 
Manning used Wget on his computer, the bottom left, and 
rather than going straight up to the web page click 
search, wait for the results to come up and then save, 
he went directly using Wget onto the web server and was 
able to mass download all of the Department of State 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



88 



cables from that database . 

What that allowed, Your Honor, PFC Manning 
to do was to circumvent, to bypass the exact mechanism 
and place on this computer system the restrictions put 
in place of using a web browser in order to view these 
documents and in order to go grab them and bring them 
down to his computer. 

In order to accomplish this complex task of 
running Wget, PFC Manning had to take specific steps to 
prepare . 

First, get and copy and paste the list of 
the MRNs, the unique identifiers from the database from 
the web page to itself. So he had to query, as Special 
Agent Shaver testified, the newest cables published, 
copy all the MRNs, copy, paste and then pasted them 
into Excel . 

Second, PFC Manning used Microsoft Excel to 
automatically link together in a chain the MRNs that he 
pasted into a Wget command line that he used the Wget 
help file to figure out . 

Actually, Special Agent Shaver used the 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



89 

term catenate organic function that PFC Manning had to 
program in order to make this process to occur quickly 
and ultimately for 251,000 plus cables. 

Finally, PFC Manning copied and pasted 
those lines from the Excel spreadsheet with the Wget 
commands into what Special Agent Shaver testified were 
batch files. A batch file allows you to run a 
executable program rapidly over and over again. 

And Special Agent Shaver testified about 
the different batch file extracts he found on the dot 
22 computer. 

Your Honor, PFC Manning used Wget to create 
a functionality that did not exist . 

Whereas Mr. Weiss testified the user 
accessed a single cable using a web browser, PFC 
Manning accessed over a quarter million cables by 
introducing Wget . 

He harvested those cables using Wget in its 
command prompt without any action in the NCD graphical 
user interface . 

Prosecution Exhibit 159, Your Honor, shows 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



90 

the staggering number of connections to the Department 
of State cables servers and the firewall logs . 

Prosecution Exhibit 159 shows that PFC 
Manning ' s computer connected to the Department of State 
cables firewall more than 700,000 times between 28 
March and 9 April; 700,000 times between 28 March and 9 
April . 

PFC Manning spent all of his working hours 
over 10 days harvesting cables for the transmission to 
WikiLeaks . 

Prosecution Exhibit 159 also shows that his 
computer connected to the same firewall over 53,000 
times on 3 May 2010 that's when PFC Manning went back 
to the NCD to harvest cables from March 22 onward. 

Mr. John testified that PFC Manning's 
personal computer possessed a script, a program that 
could convert information from a cable into what ' s 
called Base64 format . 

Your Honor, Base64 is an encoding layer 
that condenses information to a simpler form to 
transmit over the internet . The script had fuel for 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



91 

both classification and message record number. 

Undeterred by system restrictions and 
limitation, PFC Manning had harvested as much 
information as possible in the shortest amount of time 
and thus he had to reintroduce Wget onto his computer 
at this time. 

So at the end of his nearly two— week 
mission in March and April 2010, PFC Manning had 
harvested more than 250,000 cables. 

The evidence showed that he harvested those 
cables and packaged them and compressed them into 
Base64 for transmission to WikiLeaks . 

Your Honor, Prosecution Exhibit 102 is a 
printed version at the very top of the worksheet named 
the backup xlsx file that was left on the dot 22 
computer . Backup dot xlsx . This is a Microsoft Excel 
file. 

Your Honor, that printed worksheet, 
Prosecution Exhibit 102 shows how PFC Manning cataloged 
every single cable he harvested from NCD . The first 
line on that worksheet, Your Honor, is 251,288. 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



92 

Your Honor, I'll talk about that number in 
a moment. But Prosecution Exhibit 104 that shows 
backup dot xlsx, that was created on 3 May 2010 and 
that ' s in that bloop folder we have talked about . 

THE COURT: Created when? 

MR. FEIN: 3 May 2010, Your Honor. 

And that was in the bloop folder in PFC 
Manning's My Documents. 

Prosecution Exhibit 104 also showed that 
files dot zip, another file was created on 4 May 2010. 

The volumes dot txt, the volume mounting 
data from the SIPRNET computer shows Prosecution 
Exhibit 127, shows that, Your Honor, the volume dot txt 
file show that a file named file dot zip was burned to 
a CD on a SIPRNET computer that same day, 4 May 2010, 
and ultimately moved to PFC Manning's personal Mac. 

Your Honor, on 31 August 2011 WikiLeaks 
published 251,287 purported Department of State cables 
without any redactions . That number is very important . 
I stated earlier PFC Manning left behind a file — 

THE COURT : What was the number? 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



93 

MR. FEIN: 251,287, Your Honor. 
THE COURT: Okay. 

MR. FEIN: And, Your Honor, if you 
recollect, the backup xlsx file started with the number 
251,288. 

While WikiLeaks published the 251,287 
purported cables that were dated through February 2010, 
the purported cables WikiLeaks released did not include 
March, April and May 2010. 

PFC Manning had the cables from March 
through May 2010 ready to go with his starting number 
and that backup dot xlsx file of 251,288. And those 
were the cables, Your Honor, located in the files dot 
zip file that Special Agent Shaver testified. 

This number of course, 251,288, is the next 
number in line after 251,287. That is — so 
ultimately, Your Honor, PFC Manning, PFC Manning 
reintroduced Wget to go back and harvest the remaining 
cables starting with 251,288 because he had already 
compromised to WikiLeaks 251,287 purported cables that 
they released unredacted. 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



94 

His determination and persistence had not 
ceased. He wanted more to increase the effect in his 
future right at this time . When extracted the records 
from NCD to his personal computer, PFC Manning 
completed the theft of those records . 

The NCD records were stored on a classified 
system where only authorized personnel with 
need— to— know could access them. At no time was PFC 
Manning authorized to house those records on his 
personal computer . 

Furthermore, PFC Manning converted the 
information in the cables from NCD when he conveyed 
them to the WikiLeaks for release . 

PFC Manning specifically intended for the 
cables to be published and WikiLeaks obliged. The 
United States devoted significant resources to protect 
the classified information within NCD. 

Mr. Lewis testified that foreign 
intelligence services will pay for information 
precisely because its exclusive possession provides 
significant benefit to the United States. 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



95 

By causing the cables to be published, PFC 
Manning substantially interfered with the United 
States' ownership rights of exclusive possession of 
that classified information in the records . 

Your Honor, the United States requests that 
the accused and Major Hurley relocate to the witness 
stand and I will hand Appellate Exhibit 617 to both the 
Defense and the Court . 

Your Honor, Mr. Lewis testified that the 
foreign intelligence services of multiple countries 
actively seek information contained in the Net— Centric 
Diplomacy records and would pay for records from the 
Net Centric Diplomacy Database . 

The foreign intelligence services seek 
information pertaining to United States strategic plans 
and specific geographic areas as detailed in Classified 
Reason Number 5 . 

Mr. Lewis testified that country 3 would 
pay well over $1,000 for the records in the Net— Centric 
Diplomasy database as set forth in Classified Reason 
Number 6 . 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



96 

Mr. Lewis testified that he conducted a 
search of the Net-Centric Diplomacy data by using 
specific groups of key words . Based on his search he 
received 900 responsive hits. The hits constituted 900 
separate documents or cables . 

Mr. Lewis testified that country 3 would 
pay over $2,000 per document related to the searched 
key words . 

Therefore, Your Honor, according to 
Mr. Lewis, the Net— Centric Diplomasy database is worth 
over $1.8 million to foreign intelligence services. 

Your Honor, the United States retrieves 
Appellate Exhibit 617 from the Defense and the Court. 

Now, Your Honor, what about Wget? PFC 
Manning knew that he was not authorized to introduce 
Wget on a Government computer . 

Chief Ehresman testified that soldiers 
aren ' t allowed to introduce programs on their computer . 
They're allowed to run a program on a CD with 
authorization of the both Chief Ehresman and 
Mr. Milliman testified that if a user wanted to add 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



97 

software, the user would have to check with 
Mr. Milliman for approval. 

Mr. Milliman, a D6— A contractor, testified 
that he told the entire unit during a shift change 
brief in the first month of deployment that he owned 
the computers and was the proper authority . 

Your Honor, the first month of deployment 
for PFC Manning would have ended, the first full month 
would have ended at the end of November, Your Honor, 
well before March 2010. 

Ms . Florinda White testified that Wget was 
not authorized for D6— A computers . 

Mr. Kits also authorized — testified that 
Wget was not authorized. 

PFC Manning introduced the Wget program 
without requesting authorization. 

Wget was unlike any other program that was 
openly used by soldiers in the SCIF. No one else even 
knew what it was or what it was capable of doing that 
came and testified here in this court martial, Your 
Honor . 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



98 

So when does the Army allow Wget on its 
networks, Your Honor? 

Well, Chief Royer testified, I'm sorry, 
Your Honor, to correct what I just said, no one from 
210 Mountain that was deployed in Iraq at the time had 
ever heard of Wget including, Captain Cherepko and 
Mr. Milliman when they were deployed. 

You did hear, Your Honor, from Chief Royer 
who testified that Wget is used in his op 4 capacity 
for attacking Army networks . He uses Army Wget to 
attack Army networks . And that ' s only in circumstances 
that he's ever been authorized to introduce Wget to a 
Government computer system. He did penetration 
testing . 

Chief Royer further testified that Wget can 
be used in spear phishing and social engineering 
attacks and both Captain Cherepko and Chief Royer said 
Wget scrapes entire web sites and can choose any data 
that it chooses to extracts . 

Your Honor, Mr. Weaver testified, he was 
one of the main authors of 25—2, he testified that 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



99 

introducing unauthorized software violated 25—2 . 

Mr. Weaver testified that the authority to 
add software is reserved to specified administrators . 
PFC Manning did not have administrator privileges on 
any of his computers . 

Mr. Weaver testified that introducing 
software or creating elevated privileges constituted a 
bypass of authorized mechanisms . He testified that 
only automated functions a user possessed were those 
that came and were installed on the system as 
authorized by the Army. 

He testified that a commander could 
authorize music and games on a computer system. 
Mr. Weaver also testified that a user had personal 
responsibility under 25—2 . 

Finally he testified that a user couldn't 
add executable files or Wget specifically under AR25— 2 . 

Your Honor, as Mr. Kits, expert on D6— A 
testified that one program that soldiers did use mIRC 
chat, had been authorized as part of a technical 
bulletin that gave commanders the authority to use the 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



100 



program . 

Colonel Miller testified in regard to 210 
Mountain's use of mlRC chat as part of the mission. 

Colonel Miller testified that music, movies 
and games would have (inaudible) morale and to the best 
of his knowledge were not self —executable files . 

There's been evidence, Your Honor, of movie 
files to include music, movies and games from the 
T— drive, the share drive the brigade staff used; but 
there has been no evidence through testimony or 
otherwise admitted that music, movies and games were 
actually introduced to the T-drive or to any SIPRNET 
computer by any particular soldier. 

There has been no evidence presented that 
movies, music or games are executable programs. 

Additionally, there's been no evidence that 
storage of movies, music and games were prohibited. 
Just the introduction, the introduction is what AR25— 2 
regulates. Introduction of music, movies and games 
onto a computer system when they're not authorized is 
prohibited . 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



101 

Mr. Weaver testified that there is a 
significant distinction between introduction and 
storage of files according to the regulation. 

Mr. Weaver distinguished this for moving 
files already on a network like the T— drive because 
moving files is traditionally authorized under AR25— 2 . 

While movies, movies and games and 
authorized programs like mIRC chat were actually 
authorized by the commander, Wget was not. As stated 
before, was unknown to every single witness who 
testified and was in Iraq and FOB Hammer at the time 
PFC Manning was there . 

Your Honor, and how PFC Manning used Wget 
informs the knowledge that he knew it was unauthorized. 
He used Wget in secret . He never asked for permission 
to use Wget . 

And Chief Royer testified that someone 
could not even see Wget from five feet away. It's a 
command prompt run program. 

Special Agent Shaver testified that Wget 
could be run in the background. 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



102 

Chief Royer testified that unlike mlRC chat 
that has a window with chat rooms on it, no one who has 
never seen Wget before would know what it is . 

And Sergeant Sadtler, Your Honor, he 
testified that PFC Manning had the habit of locking his 
screen to hide what he ' s doing on his computer even 
when he was still sitting at his computer if another 
individual walked up . 

Your Honor, the United States is not 
arguing that PFC Manning was prohibited from accessing 
the NCD database itself or from downloading individual 
cables through the NCD database interface . 

However, PFC Manning was only authorized to 
do so through using a web browser installed on his D6— A 
SIPRNET computer because that is the tool, the program 
the United States Army gave him to accomplish that 
mission and he was not authorized to install or copy 
any other programs onto his computer . 

He copied Wget onto his computer for one 
purpose and one purpose only, and that was to access 
the NCD web server directly and scrape it for all the 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



103 

Department of State cables . 

Your Honor, the next set of specifications 
and the dataset is the Farah investigation. This is 
Specification 10 of Charge 2 . Specification 10 of 
Charge 2 . 

Your Honor, earlier you heard that PFC 
Manning began helping WikiLeaks in late 2009 when he 
compromised the video BE22PAX . wmv, the Gharani 
airstrike video. The video, the military operation in 
the town of Gharani and the Farah province of 
Afghanistan. That military operation resulted in US 
CENTCOM conducting a formal investigation into the 
circumstances surrounding the civilian casualty 
incident. The United States stored that investigation 
in a folder named Farah on the (inaudible) that is only 
available on SIPRNET. BE22PAX.zip and wmv was located 
in the video subf older . 

Your Honor, four months after compromising 
BE22PAX.zip and the video within it, PFC Manning 
returned to the Farah folder located on the CENTCOM SJ 
web page to download and compromise the remaining 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



104 

documents related to that investigation. 

Special Agent Shaver testified that on 10 
April 2010 PFC Manning visited Farah folder. Within 2 
hours PFC Manning had downloaded more than 330 
investigative files from the Farah folder onto his 
SIPRNET computer. 

Your Honor, Prosecution Exhibit 129, 12 9 is 
an excerpt of the CENTCOM SharePoint logs showing when 
PFC Manning downloaded the documents from the CENTCOM 
website . 

Your Honor, Prosecution Exhibit 128 is a 
summary of the portion of index dot dat file on PFC 
Manning's SIPRNET computer showing many of the 
documents PFC Manning downloaded from the CENTCOM 
website on the SIPRNET computer. 

As I explained earlier, Your Honor, 
Prosecution Exhibit 128 shows PFC Manning's computer 
connecting to the SharePoint server and the Prosecution 
Exhibit 12 9 are the SharePoint logs showing PFC Manning 
or showing files being downloaded. 

As noted earlier, Special Agent Shaver 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



105 

testified that PFC Manning did not take the video 
titled BE22PAX.zip and wmv or any other zip file on 10 
April 2010. No files were downloaded that day from the 
CENTCOM website. Why not? 

United States argue it ' s obvious . He had 
already done it , taken the videos . Why did he wait 
until 10 April 2010 to download and compromise the 
documents related to military operation? Why decide in 
10 April 2010? 

Your Honor, it's during this time from 
starting 5 April 2010 to be exact that WikiLeaks 
released Apache video between 7 and 10 April 2010 and 
the annotated and Prosecution Exhibit 81 the Intelink 
search logs, specifically lines 628 through 640, 628 
through 64 0. PFC Manning searched Intelink for 
WikiLeaks 11 times and 'Collateral Murder' twice. 

He was monitoring and reveling in the 
reaction to the Apache video . 

Your Honor, PFC Manning saw the rippling 
effects caused by the release of the Apache video less 
than a week earlier and he craved the same effect of 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



106 

that Gharani military operation especially considering 
WikiLeaks had the video since before Christmas and 
hadn ' t released it yet . PFC Manning knew the charge 
documents for Specification 10 were classified. These 
documents were probably marked secret . 

Of the 10 charged documents consisting of 
141 pages, 90 pages are marked secret at the top and 
bottom and a total of 504 classification markings, 
including the paragraph markings, appear in total. 

Your Honor, the documents were located on 
the SIPRNET on the CENTCOM SharePoint page as explained 
earlier with respect to the compromise of the video . 
Each of these web pages had a secret banner across the 
top that said "secret" multiple times. When the user 
scrolled down in the video, each page had that same 
secret banner . 

Your Honor, Mr. Hall, former intelligence 
analyst and expert testified that intelligence analysts 
are trained to handle classified documents according to 
their classification markings and that only an OCA is 
in a position to say otherwise. 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



107 

Further, many former unit colleagues of PFC 
Manning testified that their trained practice is to 
treat information on SIPRNET as classified. 

Your Honor, even PFC Manning's two 
non-disclosure agreements that he signed specifically 
state that if he ' s uncertain about the classification 
and status he is required to assume it's classified 
unless he's told otherwise by competent authority. 

The charge documents for Specification 10 
relate to the national defense of the United States, 
Lieutenant Commander Hoskins and Mr. Neri, excuse me, 
Lieutenant Colonel Retired Neri, both testified that 
the charged documents contained the type of information 
which can cause serious harm in national security and 
thus should be secret . 

And then Rear Admiral Harward, the deputy 
commander of US CENTCOM, and an OCA, testified that all 
the documents were properly classified at secret level . 

Your Honor, multiple witnesses testified 
that the charged documents contained TTP, troop 
movements, close air support, troops in combat, 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



108 

graphics showing troop movements, operational 
activities, weapon systems and code words. 

And finally, Your Honor, the United States 
Government has never made those documents of the Farah 
investigation, the classified documents, available to 
the public . 

Your Honor, the Global Address List 
Specification 16 of Charge 2, also Specification 3 
Charge 3, excuse me, Your Honor, Specification 4 Charge 
3. Your Honor, there's no coincidence that on the same 
day of having PFC Manning's SIPRNET connection 
severed — 

THE COURT: Which specification did you say 

is Charge 3? 

MR. FEIN: Specification 4, Your Honor. 

Your Honor, it's no coincidence on the same 
day having the SIPRNET connection severed by being 
removed from the SCIF that WikiLeaks set out a net call 
for as many dot mil e-mail addresses . 

7 May 2010 we would like a list of as many 
dot mil e-mail addresses as possible . Please contact 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



109 

the editor@wikileaks . org or submit . 

Your Honor, PFC Manning saw this 2008 and 
jumped at the opportunity to continue disclosing 
closely— held information to WikiLeaks . Especially 
after being removed from the area with readily 
available SIPRNET. 

Special Agent Williamson testified that 
shortly after the 2008 was published on 7 May, PFC 
Manning searched for macros to extract the GAP . 

What does that mean, Your Honor? He 
searched for a process in order to extract the GAP . 
And by 13 May, PFC Manning had extracted Global Address 
List and deleted the stolen files . 

Specification 4 of Charge 3 accounts for 
this criminal misuse of the NIPRNET and Global Address 
List information system and Specification 16 is the 
theft of the Global Address List for his own personal 
use . 

Your Honor, Specification 4 of Charge 3 
charges PFC Manning with violating AR25— 2 paragraph 
4— 5A3 by using an information system in a manner other 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



110 

than its intended purpose. 

According to AR25— 2 information systems 
includes computers as well as set of information 
resources like the Microsoft exchange Global Address 
List . 

Chief Nixon testified that the GAL is a US 
Government product which populates information at the 
organizational level ultimately listing every person, 
entity, and machine within a given domain, and in this 
case it's Iraq. It is the interface Outlook users use 
as a directory for e-mails and other contact 
information . 

The GAL provides each user ' s e-mail 

address . 

The first line, Your Honor, John dot, we'll 
say, Doe at Iraq at CENTCOM dot mil. 

It also provides their user names for their 
accounts on NIPRNET . John dot Doe, Tasha dot Doe, Sean 
dot Doe . Their user names to log onto NIPRNET . 

You also heard testimony from Chief Royer 
that the Department of Defense tries to use the same 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



ill 

user names in all e-mails addresses in order to 
deconf lict potential over-redundancies . 

Also, Your Honor, individuals' full names, 
including their unit, office and duty description is 
included in this information. Christopher specialist 
1AAB, an S2 analyst. 

Prosecution Exhibits 47, 48, 147, there's 
going to be a few exhibits here, Your Honor. 

Prosecution Exhibits 47 and 48 are the 
entire listing of the 74,000 entries. One for the 
names and one for the e-mail addresses. That's PE47 
and 48. 

Your Honor, Prosecution Exhibits 147 and 
148 are the 20— page extracts the witnesses referenced 
on the stand. A are the unredacted forms and the 
Bravos are the ones you're looking at right here, Your 
Honor . 

This information is the entire compromised 
Global Address List as PFC Manning had access and the 
extracts used by those witnesses that I just explained. 

The first portion of an e-mail address is 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



112 

that individual ' s user name and as I mentioned a moment 
ago, Your Honor, this portion not only does it have 
their name, but their rank, their office and their, 
potentially their location of where they're working. 

Your Honor, according to Chief Royer, in 
many cases the user names continue for that 
deconf liction . Knowing user names makes the listed 
individuals more vulnerable to attack. The information 
provides adversaries a likely list of longstanding 
e-mails and (inaudible) . 

Moreover, Your Honor, in the hands of an 
adversary intelligence organization, the list is a 
virtual directory of persons with security clearances 
as you just saw and intel analysts or sensitivity 
positions as well as potential map for the unit 
structure . 

In short, Your Honor, the GAL becomes a 
phone book for exploitation. The release of this list 
would render the information and potentially the 
physical security for everyone on the list vulnerable 
to exploitation and ultimately compromise the 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



113 

effectiveness of the countless missions that those 
soldiers are working. 

Chief Royer testified that the GAL would be 
one of the top records that he would seek as op 4 . 

So according to Sergeant Bigelow, PFC 
Manning left the S2 shop on 8 May 2010 and started 
working in the supply room around 9 May 2010. 

PFC Manning was upset at the move but most 
thought it was entirely because of the fight he had 
with his fellow soldier, but he was actually upset 
because he lost his all— access pass to SIPRNET and his 
security clearance which he needed to keep in order to 
continue compromising classified information. 

PFC Manning, however, quickly found 
something else . Something that he could do to maintain 
relevance in the fast moving disclosure world and that 
was based off the WikiLeaks 2008. PFC Manning quickly 
set about refocusing his energies on NIPRNET and 
created a tester for himself in the process. 

This is Prosecution Exhibit 122, Your 
Honor . A recovered TASK for PFC Manning to exf iltrate 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



114 

the Global Address List . This TASK mentioned 
exfiltrate of CIDNE records under purpose. Also 
organized and (inaudible) PFC Manning creating a TASK 
to steal the information of CIDNE and for the Global 
Address List. Acquire and exfiltrate the GAL from the 
US forces Iraq, Microsoft Outlook, SharePoint exchange 
server . 

Very precise, Your Honor, e-mail the 
classifies messages from USFI CIDNE event log method, 
acquire the documents and exact target . Prosecution 
Exhibit 122 . 

Your Honor, Special Agent Williamson, 
forensic examiner testified that he found Google search 
page results related to the computer programming to 
extract that information from a GAL . 

The first search was for, quote, Global 
Address List Macro Outlook, end quote, and in return 
what has been marked as Prosecution Exhibit 144 . 

THE COURT: What was the name of the 

search? 

MR. FEIN: Your Honor, Global Address List 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



115 

Macro Outlook, which is also written down in the search 
field on Prosecution Exhibit 144 . 

What ' s clear from looking at the Google 
search results, Your Honor, is that that search term 
brings up potential pages in order to figure out how to 
extract and exfiltrate that information from Outlook 
because Outlook did not have a function to allow for 
the e-mails to be pulled out in batch. 

The second search was for, quote, VBA, 
Outlook write text file, VBA, Outlook write text file. 

And that returned the search results that 
are at Prosecution Exhibit 145, PE145. 

Your Honor, VBA stands for, as Special 
Agent Williamson said, Visual Basic. Visual Basic is a 
program within Microsoft Outlook, or excuse me, 
Microsoft Office that allows simple programming in 
order to have the Microsoft Office Tools programs 
complete automated tasks. And that was another process 
that PFC Manning researched in order to figure out how, 
how to get around the limitation within Outlook of 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



116 

downloading and exf iltrating all the e-mails . 

Special Agent Williamson also testified 
that Visual Basic and macros are the ways you could do 
that . 

Outlook can only save e-mails by user 
clicking on "save as" and selecting dot txt file type. 

Outlook does not have a function to mass 

export . 

Special Agent Williamson also recovered two 
different types of files related to the Global Address 
List from Staff Sergeant Bigelow's computers. Those 
two files, Your Honor, are what are in, from his 
testimony, Prosecution Exhibits 47 and 48. The names 
and then the e-mails files . 

Although Staff Sergeant Bigelow and Special 
Agent Williamson testified that this is ample evidence 
that PFC Manning used that account at the same time on 
gmail, financial records, reach out to Adrian Lamo and 
search for WikiLeaks and Julian Assange on the 
internet . 

According to Mr. Johnson, there's evidence 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



117 

that PFC Manning moved these files, the names and the 
e-mail text files, to his personal computer. As you 
heard from Mr. Johnson he found thousands of exchange 
formatted names and e-mails in unallocated space . 

This act was precisely the same process PFC 
Manning followed each time he found a disclosed 
classified material. He would use the US Government 
system to manipulate the data, download the information 
from the Government system, transfer the data to his 
personal computer either by CD or in this case because 
it's unclassified through e-mail and then package it, 
transmit the information to WikiLeaks and then delete 
the information. 

The information doesn't appear, Your Honor, 
in the unallocated space of the computer unless PFC 
Manning took the additional step of deleting it out of 
his recycle bin or trying to permanently delete it off 
of the computer . 

He took all the same steps with the Global 
Address List information as he had previously done with 
each disclosure. Each of these circumstantial pieces 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



118 

of evidence corroborates the manner, timeline and 
impetus behind his actions and proven f orensically . 

You recall that Chief Royer and Nixon 
testified that the purposes of the US forces Iraq 
Global Address List was to facilitate official 
communications . 

Nixon testified that user granted 
permissions to search for e-mail addresses but not mass 
download them. Microsoft Outlook or NIPRNET computers 
had a function — did not have a function to export or 
download the e-mails (inaudible) even in Iraq who had 
an e-mail account used and was listed in the Global 
Address List directory. 

Your Honor, we know that PFC Manning's 
conduct violated AR25— 2 by using an information system 
in a manner other than intended purpose . 

PFC Manning downloaded the U.S. Government 
information from an Army information system to his user 
account but to another user ' s account that belonged to 
a supervisor, Sergeant Bigelow . 

PFC Manning did not have permission from 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



119 

his supervisor to do this, nor did he have permission 
from the Army or individuals whose private information 
he took . 

He had no additional or legitimate reason 
for this action. 

PFC Manning took the information out of the 
safe confines that protected the United States 
Government information system and the network for his 
own personal desires by e— mailing through his either 
Gmail account or burning it onto a CD. 

The Global Address List information 
ultimately ended up on his unsecure personal computer 
on the internet that his — well on his personal 
computer connected to the internet . 

PFC Manning exposed the sensitive personal 
information of his brothers and sisters in arms, 
including all the civilians deployed in Iraq within the 
74,000 names. 

Exposed all that information to foreign 
intelligence collection as well as spear phishers and 
other electronic invasion schemes . 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



120 

PFC Manning told each Adrian Lamo that 
after adversaries used spear phishing, he used the word 
spear phishing, to attack the United States . 

PFC Manning noted that the adversaries are 
not successful typically because they can't penetrate 
the air gap . 

Instead, it was PFC Manning, Your Honor, 
who penetrated the air gap, meaning the connection 
between the US Government systems and the rest of the 
internet. PFC Manning's actions likely exposed the 
system relied upon by these service members to 
electronic intrusion as he knew this from his IA 
training . 

Chief Nixon and Chief Royer testified there 
would be no reason, Your Honor, no reason to download 
the Global Address List because without access to an 
exchange server a person couldn't even send an official 
e-mail. When you have access to the exchange server, 
you automatically have access to the Global Address 
List . 

The proper (inaudible) is the information 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



121 

contained the Global Address List . The value of the 
information established is by the independent pieces of 
evidence . 

Your Honor, the issue here is whether the 
74,000 e-mails were more than the statutory limit for 
the 641 offense. 

Chief Nixon testified that dozens of 
service members worked on creating and entering the 
information for each user that goes onto the Global 
Address List . 

Every time a new user soldier entered that 
information, Chief Royer testified they would take at 
least 10 minutes to create a new account in the Global 
Address List. For 74,000 e-mails that is 740,000 
minutes, or over 12,000 hours or over 51 days straight 
with no sleep for one soldier to create every Global 
Address List entry that PFC Manning stole. 

Chief Royer testified that soldiers ranking 
from Specialist to Chief Warrant Officer 4 created 
Global Address List entries . 

In 2010 a soldier at the rank or grade of 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



122 

E4 rank the Specialist earned approximately $1,800 per 
month, which also is approximately $11 per hour 
assuming a 40— hour work week. 

At a rate of $11 per hour for 1233 hours it 
would cost over $145,000 to create the entries for the 
GAL. Thus, the salary for a Specialist to create each 
e-mail address and associated information that PFC 
Manning took when he stole the GAL would well exceed 
$1, 000. 

Your Honor, overall the portion of the GAL 
that PFC Manning took, he stole, consists of 74,000 
users. It is clear that — excuse me, Your Honor, 
Mr. Lewis testified that the foreign intelligence 
services of multiple countries actively seek 
information in the GAL and would pay for the GAL. 

Your Honor, for the last time, the United 
States requests that the Defense relocate to the 
witness box and I'm going to hand Appellate Exhibit 617 
to the court and the accused. 

Your Honor, the foreign intelligence 
services seek information pertaining to specific 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



123 

individuals and associated organization information as 
detailed and Classified Reason Number 9 . 

Mr. Lewis emphasized that a block of 
information is more valuable to foreign intelligence 
services . The GAL reveals unit strength and can be 
associated with other intelligence to increase 
adversarial understanding of the United States TTPs 
because the GAL states duty positions and units . 

Thus, Mr. Lewis testified that country 5 
and their intelligence services would pay over $3,000 
on the low end for the records in the GAL as set forth 
in Classified Reason Number 10 . 

Your Honor, the United States is — or I 
will retrieve Appellate Exhibit 617 from the Court and 
the witness. 

In this case, Your Honor, as PFC Manning 
took the deliberate actions I previously described to 
target, extract, and transfer and then hide US 
Government information, all for the unofficial purpose 
of transferring this information to WikiLeaks because 
they asked for it, in doing so, Your Honor, you heard 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



124 

testimony that PFC Manning deliberately placed all US 
Government employees and soldiers in Iraq at personal 
risk by removing their PI from the NIPRNET protected 
system. This PI, by Army regulation 25—2, is sensitive 
information that shouldn't be placed on a personal 
computer . 

When PFC Manning extracted the GAL to his 
personal computer he completed his theft of those 
records . The GAL was stored on an unclassified system 
where only unauthorized or where only authorized 
personnel could access them. 

At no time was PFC Manning authorized to 
house the GAL on his personal laptop. 

Mr. Lewis testified that foreign 
intelligence services will pay for this type of 
information precisely because its exclusive possession 
by the United States Government, provides a significant 
benefit . 

Your Honor, at this time the United States 
recommends we go in one final recess and then finish 
the closing. 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



125 

THE COURT: All right. 

MR. FEIN: Or keep going, Your Honor. 

THE COURT: No. This is a good time to 
take a 15-minute recess. 

I ' d like to see counsel in my chambers to 
talk about the way ahead during that recess. 

(Court in recess.) 

THE COURT : Court is called to order . 

Let the record reflected all parties 
present when the court last recessed are present . 

Before we proceed with the remainder of the 
Prosecution's closing argument, counsel and I met in 
chambers over the recess to look at the way ahead. 

First of all, we discussed the Court 
granted three amendments to the charge sheet and the 
Government has not made those yet so the Government 
will do that in recess, Xerox copy of the original 
charge sheet that has the charges at arraignment . 

And secondly, in light of the time, what we 
are going to do is finish the Government ' s closing 
argument today . 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



126 

We'll start at 0930 with the defense 
closing argument and rebuttal by the Government if they 
have any . 

MR. FEIN: Your Honor, Specification 1 of 
Charge 2 . In total PFC Manning compromised more than 
700,000 classified documents to WikiLeaks and 
unquestionably knew that anything he compromised to 
WikiLeaks would be released to the public on the 
Internet. And how did he know that, Your Honor? 

THE COURT: Are you doing Specification 1, 
Charge 1 or Specification 1 of Charge 2? 

MR. FEIN: Your Honor, Specification 1 of 

Charge 2 . 

How do we know that, that PFC Manning 
unquestionably knew that anything he compromised to 
WikiLeaks would be released to the public on the 
internet? 

First, he repeatedly reviewed intelligence 
reports discussing the WikiLeaks ' mission and its 
operations no later than 1 December 2009. This 
included the ACIC report, IRR and C3 document, which 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



127 

all of them explicitly told PFC Manning anything that 
he provided to WikiLeaks would be released to the 
public . 

Second, his chat to Julian Assange. While 
committing his reckless disclosures, PFC Manning 
contemporaneously engaged in online chats with Julian 
Assange and urged him to release the documents 
previously provided by him to the ones that were not 
released. 

Third, his constant research of the world 
reaction when the documents he compromised to WikiLeaks 
were released to the public . 

And, fourth, his chats with Julian Assange 
where he released his criminal acts. Your Honor, PFC 
Manning chose to compromise the documents to WikiLeaks 
because he knew that WikiLeaks would release them on 
the internet . 

So what did PFC Manning cause to be 
published by the internet? 

The Court took judicial notice of the 
following facts: On 15 March 2010 WikiLeaks released 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



128 

the ACIC report, an actual intel report measuring the 
threat caused by WikiLeaks . 

On 5 April 2010 WikiLeaks released the 
Apache video of a military operation. 

On 25 July 2010 WikiLeaks released more 
than 75,000 SIGACTS from the CIDNE-A database. 

THE COURT: What was the date of that? 

MR. FEIN: 25 July 2010, Your Honor. 

Contained actual tactical reports of 
significant events occurring in Afghanistan. 

On 22 October 2010 WikiLeaks released more 
than 390,000 SIGACTS from the CIDNE-I database and 
those containing actual tactical reports of significant 
events occurring in Iraq. 

Your Honor, 27 and 28 November 2010 
WikiLeaks began releasing the Department of State 
cables and that is what the court took judicial notice 
of and Special Agent Bettencourt testified on 21 
August 2011 all the purported cables were released by 
WikiLeaks and those were actual reports showing how we 
conduct foreign relations . 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



129 

Your Honor, 25 April 2011 WikiLeaks 
receives more than 700 GTMO DABs, detainee assessment 
briefs, that were actual reports containing 
intelligence relating to the particular detainees. 
Each of these records, were produced by United States 
Government, stored on the SIPRNET, and were integral to 
the war against terrorism or US foreign policy and 
diplomacy . 

Witnesses testified that the ACIC report, 
Apache video, SIGACT database, NCD database, SOUTHCOM 
database, all contained actual and true information 
thus intelligence. This intelligence was accessible to 
PFC Manning and PFC Manning made this intelligence 
accessible to the world on the internet through 
WikiLeaks . 

Your Honor, you have heard evidence that 
PFC Manning knew he was not authorized to transmit 
these classified documents to WikiLeaks and WikiLeaks 
was not authorized to receive classified information. 
It did not meet the three criteria that PFC Manning 
knew too well . 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



130 

You have also heard, well — an 
overwhelming amount of evidence that PFC Manning knew 
that the enemy uses the internet to gather 
intelligence . 

Specification 1 of Charge 2 requires the 
United States to prove that PFC Manning acted wantonly 
when he caused this intelligence to be published on the 
internet, whether all the (inaudible) circumstances his 
conduct was that he, that a type of heedless nature 
that made it actually or eminently dangerous to others . 

The evidence without question is 
overwhelming to prove, at the very least is utter 
recklessness . 

PFC Manning compromised more than 700,000 
classified documents during the 7— month deployment. 
That's 100,000 documents per month, 3,300 documents per 
day, 138 documents per hour and more than two documents 
every minute . 

Your Honor, there is absolutely no way he 
even knew what he was giving to WikiLeaks as far as the 
entire large databases . Instead, he learned the exact 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



131 

details of what he compromised the same time as the 
public and the enemy. 

The individual details, PFC Manning, 
without question, understood this risk. He told Adrian 
Lamo that Hillary Clinton and several thousand 
diplomats around the world were going to have a heart 
attack when they woke up one morning and found an 
entire repository of classified foreign policies 
available in searchable format to the public. He 
recognized that and even acknowledged that his actions 
will affect everybody on earth in the same chats . 

Lastly, Your Honor, the United States 
proved that PFC Manning's misconduct was prejudicial to 
good order discipline and service for all of the 
Specification of Charge 2 . 

Colonel Miller, Colonel Miller testified 
that the last thing he expected was an internal 
security breach from one of his own, an insider threat 
from within his ranks . 

According to Colonel Miller, when he 
briefed the staff about PFC Manning's actions, a 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



132 

funeral— like atmosphere fell over the crowd. They were 
angry, sad, grieved and frustrated all at the same 
time . 

Colonel Miller testified that before the 
scope of PFC Manning's misconduct was revealed, the 
unit morale was at an all-time high. As they had just 
completed their mission requirements, everything was 
going well with the Iraqi security forces and they were 
beginning to do draw— down in order to redeploy to 
Ft . Drum . 

Soldiers that had been on numerous prior 
deployments within, as he testified, the most deployed 
brigade in the United States Army, were finally seeing 
the fruits of their labors over the past 10 years come 
to fruition. 

And then, PFC Manning's covert actions came 
to light . His misconduct completely shook the entire 
brigade, according to Colonel Miller. Colonel Miller 
testified that the morale took a hit . It took a hit as 
a result of PFC Manning's actions. The unit 
collectively felt it was a blemish on its otherwise 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



133 



stellar record. 

PFC Manning's recklessness negatively 
impacted the trusted formation. Colonel Miller 
testified that trusted information is the foundation 
for everything we do in the military. Every soldier 
has to know that every other soldier is doing their job 
and they have to trust each other in order to stay 
focused on their mission. Every soldier has to rely on 
each other and know that they have each other ' s backs . 

Those are the words of Colonel Miller, Your 

Honor . 

If there's a distraction and the soldier 
has to look to his left and right when he ' s supposed to 
be looking in front of him, that his eyes are off his 
job and the foundation of the military starts to 
crumble . 

Your Honor, according to Colonel Miller, 
the US Army relies on the trust of (inaudible) PFC 
Manning's actions caused the morale of the unit to take 
a hit to create the (inaudible) . Thus, Your Honor, it 
was prejudice (inaudible) and service discrediting. 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



134 

Your Honor, 104 aiding the enemy by giving 
intelligence. Your Honor, PFC Manning deliberately 
transmitted the Apache video, certain Department of 
State cables information, and the CIDNE-A SIGACTS to 
WikiLeaks . He did this with the knowledge and intent 
that it would be released to the world and he did this 
knowing that the enemy would retrieve this valuable 
information from WikiLeaks . 

Your Honor, for Article 104 purposes, who 
are the enemies of the United States . You heard 
evidence from multiple sources, multiple witnesses 
regarding enemies of the United States and specifically 
al-Qaeda and al-Qaeda of the Arabian Peninsula. 

One of those sources of evidence is your 
ruling on judicial notice. You took judicial notice 
that facts establishing (inaudible) and Adam Gadahn are 
members off al-Qaeda and enemies of the United States, 
al— Qaeda and Arabian Peninsula are also an enemy of the 
United States . 

Your Honor, you also have Prosecution 
Exhibit 153 . That is a stipulation of fact for Osama 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



135 



bin Laden . 

And you have Prosecution Exhibit 182 . The 
stipulation of fact for Adam Gadahn . You have those 
for your reference, Your Honor. 

Commander Aboul— Enein, through a 
stipulation of expected testimony, explained the 
historical background of al— Qaeda and the Arabian 
Peninsula and how they operate as an enemy of the 
United States. None of these facts for dispute. 

What's specifically contested, but not in 
dispute, is PFC Manning's knowledge. 

PFC Manning had actual knowledge that these 
enemies , al-Qaeda and al-Qaeda Arabian Peninsula used 
WikiLeaks to gather intelligence on the United States . 
And, therefore, by giving intelligence to WikiLeaks he 
was giving intelligence to the enemy. 

PFC Manning had the general evil intent 
necessary to aid the enemy and evidence shows that he 
acted voluntarily and deliberately with his 
disclosures . 

The United States proved beyond a 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



136 

reasonable doubt that PFC Manning ' s voluntary and 
deliberate actions to disclose over 700,000 documents 
to the world and public through WikiLeaks were in the 
actual hands of the enemy and PFC Manning knew this 
would occur when he released that information. 

The evidence showed that PFC Manning was a 
trained intelligence analyst . His daily work product 
as an intelligence analyst in Garrison and in theater 
established his knowledge of the enemy threat . His 
research of intelligence reports related to WikiLeaks 
warned him repeatedly of the enemy ' s use of WikiLeaks . 

In his own statements he established that 
he knew, he knew through his own words that the 
information would be made available to the world 
without alteration . 

First, Your Honor, PFC Manning's military 
training. He was an all— source intelligence analyst at 
35 fox. No other MOS in the entire United States Army 
receive such detail level of instruction on the enemies 
of the United States, what they're capable of, and why 
we keep classified information from their possession. 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



137 

Your Honor, what did PFC Manning learn at 
AIT about the need to safeguard classified and 
sensitive information? The dangers of putting such 
information on the internet and the enemy's use of the 
internet. He learned the lesson of INFOSEC . 
Prosecution Exhibit 52 . The PowerPoint slide show he 
received. The lessons on the identity of terrorist 
groups including al-Qaeda and Osama bin Laden. Lessons 
on the enemy attempting to discover how and when the US 
is conducting military operations . 

Slide 72 of PE52 . 72 of 52. 

Lessons not to discuss operational 
activities on the internet or on e-mail and that 
soldiers should always assume, always assume, that an 
adversary is reading posted material on the internet . 

Lessons that the enemy used the internet . 

Lessons that focused on the enemy piecing 
together information on the internet to use against the 
United States includes, PII, unit identification and 
unit location information. 

And, finally, lessons focused on ensuring 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



138 

information posted on the internet has no significant 
value to the adversaries because soldiers have to 
always assume, he was taught, always assume that that 
adversary is reading their material on the internet . 

Your Honor, PFC Manning knew and understood 
the different types of recruiting utilized by terrorist 
organizations, in particular al— Qaeda . And the number 
of terrorist web sites have jumped from less than 100 
to as many as 4,000 over the past 10 years. 

He also learned about non-disclosure 
agreements. In 2008 he signed two of them, two 
non— disclosure agreements accepting responsibility for 
having knowledge of the potential effects of 
unauthorized disclosure of classified information. He 
declared his understanding of being reposed trust and 
confidence to protect our nation's secrets. 

Based on his training and assigning of two 
non— disclosure agreements, PFC Manning had actual 
knowledge that terrorist organizations would use 
WikiLeaks as a source for their intelligence 
collection . 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



139 

When disclosing all the classified 
information from the SIPRNET, PFC Manning understood 
the consequences of his actions and knew, without any 
doubt, Your Honor, that the information he compromised 
would be in the hands of the enemy . 

Prosecution Exhibit 25 is a copy of the 
OPSEC PowerPoint brief he created and taught others . 

Prosecution Exhibit 25, his own words, Your 

Honor . 

And, Your Honor, the fact that Osama bin 
Laden asked for the disclosed information and received 
it proves that PFC Manning was correct when he taught 
in Prosecution Exhibit 25 that adversaries, including 
foreign governments, terrorists and activists and 
hackers, that's who they are, that the common OPSEC 
leaks include leaks on the internet and that disclosure 
of the information on the internet must be avoided 
because one must use common sense because there are 
many enemies and it's a free and open society. 

Your Honor, that was just, just his 
knowledge before arriving to 210 Mountain; but what 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 

140 

about PFC Manning, what, did he know based on the actual 
analytic work product that he was required to perform? 

He had extensive experience studying enemy 
TTP, both pre— deployment and during his deployment. 

At Ft . Drum he conducted weekly briefings 
to his superiors on worldwide threats and specific 
threats in Afghanistan and Iraq. 

He was very good at computers . One of his 
strengths was data mining . 

Data mining was critical to the enemy 
predictive analysis that you've heard about, that study 
of an enemy trend to be able to predict their future 
activities . 

Mr. Hall testified as an expert, said that 
PFC Manning would have been aware, he would have been 
aware that the enemy engaged in similar pattern 
analysis about the US TTPs and movements. 

PFC Manning acknowledges his own 
understanding of the value of the information that he 
passed to WikiLeaks by claiming the SigActs for Iraq 
and Afghanistan are, "possibly one of the most — " or 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



141 

excuse me — "one of the more significant documents of 
our time. Removing the fog of war and revealing the 
true nature of 21st century asymmetric warfare." 
Prosecution Exhibit 42 . 

Your Honor, in addition to his training and 
work product, PFC Manning kept different military 
publications on external hard drive that showed he was 
not naive or an ignorant soldier but one who 
methodically kept track of information, including the 
information regarding the use as weapons of 
pro— insurgent web sites by the enemy. 

The methodology the enemy uses on the 
internet to further the anti-US causes, including cyber 
mining for intelligence. Information warfare in the 
form of propaganda is a well— known enemy tactic. 

His possession of all the above data 
information is additional circumstantial evidence that 
PFC Manning had actual knowledge leading to the only 
reasonable inference that he knew by disclosing this 
information to WikiLeaks, an organization he knew would 
release any information he was providing them to the 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



142 

public . He was giving the information to the enemy and 
specifically al-Qaeda and the al-Qaeda at the Arabian 
Peninsula . 

PFC Manning's knowledge of the enemy using 
the internet was further developed, Your Honor, in his 
own searching for repeated reading and habitual 
compromising of the classified information pertaining 
to WikiLeaks website . 

He read three different intellectual 
reports that explicitly told him that the enemy will 
read anything posted on WikiLeaks . 

First, Your Honor, the ACIC report. As I 
already discussed, PFC Manning first accessed this 
basic website on 19 November 2009 and then viewed the 
document, the document being Prosecution Exhibit 45 and 
46, on 1 December 2009. 

So what did PFC Manning learn from that 
document? That WikiLeaks represented a potential force 
protection, counterintelligence, OPSEC and INFOSEC 
threat . 

Unauthorized release of classified 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



143 

documents provide foreign intelligence services and 
terrorist groups potential actual information against 
the United States . 

That they post all the information they 
receive without editorial oversight . 

That a reader must presume, they must 
presume foreign adversaries will read and assess any 
information . 

PFC Manning also appreciated the value of 
the ACIC document in cyber intelligence reporting. 

On 15 March 2010 PFC Manning sent an e-mail 
to Captain Lim and Captain Martin and Chief Balonek and 
others in the S2 shop stating, quote, occasionally has 
good hits from extremist website in ROE founded earlier 
this morning, end quote. 

And then to provide the ACIC website in his 
e-mail, http colon slash slash ACIC portal dot north 
slash inscom dot Army dot smil dot mil. This e-mail is 
contained on PE12, PFC Manning's dot 22 SIPRNET 
computer. PFC Manning read this document on five 
occasions and he also compromised this document to 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 

144 

WikiLeaks . 

Second, Your Honor, NCIRR. As I already 
discussed. PFC Manning first PE99 after conducting a 
search for WikiLeaks on Intelink on 1 December 2009. 
On 14 February 2010 he downloaded the report and 
disclosed it to WikiLeaks . 

So what did he learn from this IRR. That 
WikiLeaks self —described uncensorable Wikipedia for 
untracable mass document leading and analysis . 

WikiLeaks in 2008 had garnered the 
attention of major news media outlets but not 
intelligence reporting within the United States because 
it was largely north. 

Interesting enough, Your Honor, the IRR 
also included contact information for the NCIS cyber 
security office. 

If PFC Manning had any questions about the 
threat WikiLeaks posed to our National Security he 
could have reached out for clarification which he 
clearly did not do . 

However, Your Honor, we do know what he 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



145 

did, he kept Julian Assange's contact information and 
he reached out to them in November of 2009 instead of 
seeking clarification if he actually doubted what he 
read . 

Third, Your Honor, the C3 trip report. As 
I already discussed, PFC Manning's first would have 
viewed the C3 report, Prosecution Exhibit 43, after 
conducting a search for WikiLeaks on Intelink or after 
January 2010. On 14 February 2010 he downloaded the 
report and disclosed it to WikiLeaks . 

So what did he learn from the C3 report, 
Your Honor? On page 2, quote, the internet is an 
essential communication tool for terrorists, end quote. 
That WikiLeaks is a publicly accessible internet 
website where individuals submit leaked information and 
have it published to the public anonymously without 
fear of being held legally liable . 

Information that can be disclosed includes, 
but not limited, classified information and then on 
page 3, Your Honor, on page 3 of the C3 report, 
WikiLeaks poses a large threat not only from the actual 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



146 

external disclosure, but from the insider, the insider 
would be able to easily leak information without fear 
of any direct individual repercussions. 

PFC Manning read these three different 
reports on multiple occasions during his deployment and 
he chose to compromise those reports . 

By reading and disclosing these three 
documents he knew at a minimum that WikiLeaks had a 
self —admitted reputation for encouraging leaks of 
classified information for the United States Government 
and releasing that information. 

By reading and disclosing these three 
documents PFC Manning knew at a minimum that any 
website that posts anything it received would be used 
by the enemy. 

These documents, coupled with his 
intelligence training on the means and methods that 
al— Qaeda and the Arabian Peninsula employ, PFC Manning 
knew the exact type of information he chose to disclose 
would be useful to the enemy. 

PFC Manning knew the informations existence 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



147 

on the internet would actively encourage our nation's 
enemy to gather and data mine the information just like 
he had to do for his country as an intelligence 
analyst . 

This is particularly true, Your Honor, in 
light of PFC Manning's specific training on al— Qaeda at 
ART, 210 Mountain, JRTC rotations and in— theater . 

His own words informed his actual 
knowledge, Your Honor, deliberate acts of disclosure to 
WikiLeaks would inevitably result in our nation ' s enemy 
possessing the compromised materials . His own 
statements document knowledge. By giving the 
information to WikiLeaks (inaudible) , PFC Manning knew 
the information had a global scope and he was creating 
worldwide anarchy and that was a beautiful and 
horrifying thing to him. Global scope worldwide 
anarchy and that was a beautiful and horrifying thing. 

That's page 9, Your Honor, of the Lamo 

chat s . 

These are not the words of a humanist, but 
these are the words of an anarchist . 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



148 

PFC Manning knew how WikiLeaks held 
themselves out to the world, quote, like you're the 
first intelligence agency for the general public, end 
quote. Page 9, Assange chats. 

On page 10 of the Assange chats, Julian 
Assange specifically states to PFC Manning that, quote, 
WikiLeaks described itself as the first intelligence 
agency of the people. Better principle and less 
parochial than any Government intelligence agencies . 
It is able to be more accurate and relevant . It has no 
commercial or national interests at heart . It is only 
interested in the revelation of the truth. Unlike the 
covert activities at state intelligence agencies, 
WikiLeaks relies upon the power of overt fact . 

Your Honor, PFC Manning's work with an 
intelligence agency of the people is not an act of a 
person trying to spark a national debate but rather an 
act of a soldier, a soldier of the United States Army 
that has no longer loyalty to his country because he 
had no, no national interest at heart. 

PFC Manning depended on WikiLeaks posting 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



149 



whatever he disclosed to them on the internet . 

Additionally, PFC Manning's chats with 
Adrian Lamo informed his knowledge of WikiLeaks and the 
effects of his actions . 

He called WikiLeaks a group of FOI 
activists, he knew the compromise of Department of 
State cables would affect everybody on earth. 

He noted, again, Your Honor, that Hillary 
Clinton and several thousand diplomats around the world 
are going to have a heart attack when they wake up one 
morning and find an entire repository of classified 
foreign policies available and in searchable format for 
the public . 

He created the searchable format for the 
public, the public included the enemy and he knew that, 
Your Honor, as an intelligence analyst. 

He even acknowledged that, quote, could 
have sold the information to Russia and China but chose 
not to because it ' s public data . And because another 
state would take advantage of the information and try 
to get some edge . 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



150 

This isn't public data, Your Honor. This 
is United States Government classified information he 
was trained to use to protect our soldiers and knew the 
effects of his actions . 

Your Honor, this simple acknowledgement by 
PFC Manning shows that he understood the utility and 
financial value of this information and how foreign 
entities desired the information. 

Your Honor, the defense would like you to 
believe that PFC Manning actually wanted to spark 
change and reform. However, PFC Manning never once 
mentioned protecting the American public or the United 
States as being any sort of motivation for his crimes 
in any of his chats or e-mails . 

Simply put, if PFC Manning had given the 
information to Russia or China, he would have made an 
incredible amount of money according to him. If 
nothing else, he was skilled in constructing post 
justifications to his acts that were not based in 
facts, actual actions themselves, the actions that 
we're discussing here. This is true for the evidence 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



151 

defense elicited in the McNamara chats and Lamo chats . 
Based on his actions, Your Honor, admissions to Assange 
and Lamo, his predeployment admission to Ms. Showman, 
PFC Manning had no allegiance to the United States and 
the flag it stands for . 

You heard the testimony from Ms . Showman 
that during a predeployment counseling session she 
pointed to the American flag on her shoulder and asked 
PFC Manning what that flag meant to him. 

His answer, that flag meant nothing to him. 
He had no allegiance to any people . Similar words to 
one who is an anarchist . 

Ms. Showman testified that after this 
incident she notified Sergeant Mitchell and Master 
Sergeant Adkins . 

And, Your Honor, you heard, although 
suffering from memory problems, that Master Sergeant 
Adkins testified that he remembered signing his 
administrative reduction board appeal, that document 
which occurred two years ago, and on that appeal he 
recalled Ms . Showman telling him about the incident and 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



152 

him reporting that incident to Major Clawson, his boss 
at the time. 

PFC Manning did have a general evil intent, 
Your Honor, which was manifested through his deliberate 
and repeated compromise of classified information. His 
wholesale disclosure of information from databases that 
he could not have even read all the information then . 
Based on the general evil intent PFC Manning knowingly 
gave through WikiLeaks al— Qaeda and the al— Qaeda 
Arabian Peninsula specific intelligence which was found 
in their possession. 

Your Honor, there's no dispute that 
information from the CIDNE— A database, specifically the 
SIGACTS, certain Department of State cables and the 
Apache video are intelligence. And that intelligence 
was received by al-Qaeda and the al-Qaeda in the 
Arabian Peninsula . 

As the Court is aware, intelligence means 
any information which is helpful to the enemy and true, 
at least in part . 

First, Your Honor, the CIDNE-A SIGACTS, 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



153 

Your Honor, according to stipulation of fact for Osama 
bin Laden on 2 May the United States Government 
officials raided UBL's compound located in Pakistan and 
collected several items of digital media. On that 
media was first a letter from UBL to a member of 
al-Qaeda requesting that member gather Department of 
State cables posted to WikiLeaks . 

And then also a letter from the same member 
of al-Qaeda to UBL attached to which were the SIGACTS 
from the CIDNE— A database as posted by WikiLeaks . 

The classified version of the stipulation 
of fact, Your Honor, Prosecution Exhibit 153 Bravo, 153 
Bravo explains exactly what Osama bin Laden asked for 
and what he exactly received. 

Second, Your Honor, the Apache video in a 
video released about al-Assad media organization 
operated by al-Qaeda. Adam Gadahn showed the edited 
version of the Apache video which PFC Manning disclosed 
to WikiLeaks . 

The stipulation of fact for Adam Gadahn, 
Prosecution Exhibit 182, explains the terrorist video 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



154 

in which excerpts of the WikiLeaks Apache video weren't 
present . 

Third, Your Honor, Department of State 
information was in the hands of two different enemies 
of the United States : Osama bin Laden and Adam Gadahn . 

According to the stipulation of fact for 
Osama bin Laden, Prosecution Exhibit 153, during the 
raid of his compound United States Government officials 
also collected Department of State cables information 
released by PFC Manning. 

Your Honor, the classified Department of 
State cables found in UBL ' s possession is in 
Prosecution Exhibit 173 Charlie. And this document 
makes it clear that in the year of its publication, the 
intelligence community understood certain capabilities 
of the enemy and PFC Manning himself ignored those 
indicators when deciding to compromise all the 
classification . 

Prosecution Exhibit 173 Charlie, in the 
same terrorist recruitment video released by al— Assad 
and Adam Gadahn also showed the Department of State 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



155 

cables information contained from PFC Manning and 
WikiLeaks . 

Prosecution Exhibit 174 Bravo and Charlie 
described in-depth the Department of State cables 
information present in the Gadahn video . 

In order, Your Honor, for the intelligence 
104 article, the purpose of the information must be 
helpful or useful to the enemy . How is this material 
helpful to the enemy? 

CIDNE— A, Your Honor, you heard testimony 
that CIDNE— A contains tactical information about how we 
fight our wars and our enemy inflict damage on our 
soldiers . 

This is our playback, a snapshot unit, TTP, 
battle drills and call signs. With this information 
the enemy now knows how each individual unit, company 
to division, who deploy to Iraq or Afghanistan between 
2004 and 2009 executes its wartime mission. 

United States faces enemies worldwide and 
not just in Iraq and Afghanistan. IEDs are not unique 
to those theaters . Now PFC Manning provided any enemy 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



156 

of the United States worldwide this data . 

The SIGACTS from CIDNE-A details whether 
the enemy was successful in the attacks against US 
forces, if a specific IED did or did not work. 

The enemy can now use the factual 
information from the reports to develop their own TTP 
to better employ IEDs against the United States . 

This is the exact same process, Your Honor, 
that PFC Manning was trained and used when he 
determined the safest route or the highest density of 
IED ' s for his commander . 

You heard from Commander Aboul— Enein that 
acknowledgement of successful attacks against US forces 
boosts the morale within al-Qaeda and may lead to 
increase in attacks. This, too, Your Honor, applies 
worldwide. There is no question why UBL himself wanted 
this material based on that type of information and he 
received it . 

The Apache video. Your Honor, you heard 
testimony from Commander Aboul— Enein that media 
perception is important to al-Qaeda and any event that 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



157 

places al— Qaeda in a positive light or US forces in 
negative light is beneficial to al-Qaeda. 

The edited and released version of the 
Apache video is obviously a video that al-Qaeda can use 
in propaganda . 

Terrorist organizations now have it, proven 
by Adam Gadahn calling on all Jihadists to view the 
video and war against United States . 

PFC Manning knew this would happen from his 
training when he taught, when he was taught, excuse me, 
Your Honor, that within the last 10 years the number of 
terrorists web sites have jumped from 100 to as many as 
4,000 and in recruitment. 

PFC Manning (inaudible) . Department of 
State cables, you heard testimony from Commander 
Aboul— Enein that events that undermine the foreign 
leaders, excuse me, cooperation with foreign leaders, 
Your Honor, would create an environment, an environment 
which terrorists, ideology excels through al— Qaeda. 

The Department of State cables captures 
candid discussions with foreign leaders and has a 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



158 

potential to create the type of hostile environment . 

Even PFC Manning himself recognized this in 
his chat with Adrian Lamo when he stated that line 
about Hillary Clinton and the several thousand 
diplomats . 

This was even obvious to Osama bin Laden, 
who wanted this material and he received it, and he 
received it, asked for this type of material and 
received it, and he was in the most isolated regions 
within Pakistan, Your Honor. 

PFC Manning also understood the enemy ' s 
ability to data mine for information. 

As Mr. Hall testified, all junior analysts 
know that enemy conducts particular analysis based on 
data it can access and the enemy does this through data 
mining . 

PFC Manning knew this when he decided to 
make the information available to the enemy in the 
format he made it available . 

Your Honor, Inspire magazine, a magazine 
published on the internet by al— Qaeda in the Arabian 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



159 

Peninsula. Inspire magazine serves as a propaganda 
tool . 

On 16 January 2010, Inspire magazine 
published Issue No. 4, Winter 2010 edition on the 
internet. On pages 44 and 45 of that issue, the 
magazine lists activities in western Jihadist to wage 
Jihad against the United States and the west . 

Specifically, the magazine pointed out that 
archiving large amounts of information is helpful to 
AQAP and it further lists, "anything useful from 
WikiLeaks is useful for archiving." 

Al— Qaeda in the Arabian Peninsula 
recognized the value that PFC Manning made available to 
them through WikiLeaks and directed its followers to 
perform essentially the same function that PFC Manning 
did for the United States, data mine for information 
they could use . 

Your Honor, the CIDNE-A SIGACTS, Department 
of State cables information, the Apache video are all 
information that is of value to the enemy and thus 
intelligence . 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



160 

PFC Manning knew who the enemy was and what 
type of information they sought, specifically 
classified information and tactical information. 

He knew that the enemy used the internet 
and that WikiLeaks was helpful to our enemies . 

He knew that WikiLeaks website commonly 
contained classified official US Government information 
and for that reason was commonly visited by the enemy 
like any other website like that . 

PFC Manning was well— informed of how 
WikiLeaks operated. He searched for WikiLeaks more 
than 100 times on Intelink during his deployment or, as 
you heard earlier, roughly four searches for every five 
days in theater. 

He knew that anything that he disclosed to 
WikiLeaks would be posted on the internet and he knew 
that foreign adversaries will review and access DoD 
sensitive or classified information posted to the 
WikiLeaks website . 

PFC Manning posed that question, Your 
Honor, to Adrian Lamo in his chats: If you had 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



161 

unprecedented access to classified networks 14 hours a 
day, 7 days a week for 8 plus months what would you do? 

PFC Manning asked that question six months 
after he starting exfiltrating information from the 
SIPRNET. He asked that question six months after he 
knowingly provided intelligence leaks about the United 
States through WikiLeaks . (inaudible) . He asked that 
question six months after researching WikiLeaks on 
Intelink and other classified databases and watching 
the effects of previous disclosures yet continuing to 
disclose . 

PFC Manning provided his answer to Adrian 
Lamo on page 8, Your Honor, of his chat: "Let's just 
say someone I know intimately well has been penetrating 
US classified networks, mining data like the ones 
described, and then transferring that data from the 
classified networks over the air gap onto a commercial 
network computer, sorting the data, compressing, 
encrypting it, and uploading it to a crazy white haired 
aussie who can't seem to stay in one country very 
long . " 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



162 

What you did not see, Your Honor, in those 
chats with Julian Assange or Lauren McNamara is that he 
had a duty to his country and a specific duty to 
protect classified information and other sensitive 
information and with this access that he work hard to 
assist his fellow soldiers that are in enemy sites . 

PFC Manning never took pause when divulging 
to Adrian Lamo that he had created a massive mess and 
no one, his own words, Your Honor, no one had a clue 
because 95 percent of the efforts are on physical 
security of classified networks and managing 
operational security on unclassified networks . 

That ' s on Lamo page 8 of his charts . 

PFC Manning was an anarchist whose agenda 
was made abundantly clear almost immediately after he 
deployed to Iraq. He was not naive. 

Each time he downloaded and transmitted 
closely— held information he made deliberate decisions 
to break ranks with his nation throwing all his 
training and experience aside and releasing that 
information to the world. 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



163 

He used his access to classified networks 
that Julian Assange claimed held the alleged covert 
activities of state intelligence agencies and made 
those secrets overt fact for the world to view, all the 
while knowing the world included progressive and 
technologically savvy enemies that used any US 
Government information against our nation. 

Your Honor, in the Assange chats, page 5, 
page 5, PFC Manning boasts on his knowledge that, "the 
more the Government controls information, the harder 
the Government tries, the more violently the 
information wants to get out." 

Your Honor, the information did not just 
ooze from the SIPRNET onto the World Wide Web for the 
enemy to access, but was the precise outcome that PFC 
Manning desired when he took the deliberate steps to 
disclose over 700,000 documents by moving that 
information one disk at a time from SIPRNET to his 
personal Mac bridging that air gap . 

Your Honor, rather than focusing on his war 
fighting mission, he made the decision to disclose the 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



164 

700,000 from SIPRNET knowing that once WikiLeaks 
received the information they would release it for the 
world to access and he knew the world included the 
enemies of the United States . 

He was not a naive or wellOintentioned 

soldier . 

Your Honor, a well-intentioned soldier does 
not claim that: "The State Department fucked itself. 
Placed volumes and volumes of information in a single 
spot with no security . " 

Lamo chats, Your Honor, page 41. 

Or, have a conversation recognizing that 
the only people you trust can fuck you, info-wise at 
least . 

Lamo chats, Your Honor, page 41. 

This recognition of system weaknesses and 
the active and deliberate exploitation of those 
weaknesses are not the acts of the naive and 
well-intentioned soldier, but one who acts in a 
calculated manner and for his own purposes . 

The only naivety PFC Manning shows, Your 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



165 

Honor, throughout his entire endeavor was that despite 
admitting to his crimes and multiple chats, making 
admissions of e-mails, keeping trophies of his handy 
work and not forensically wiping his machine daily, he 
actually thought he would get away with what he did and 
he wouldn ' t get caught . 

PFC Manning is a United States Army 
intelligence analyst that the United States trained and 
trusted to use multiple intelligence systems to provide 
real time information to leaders on the battlefield and 
he used that training to defy our trust and 
indiscriminately and systematically harvested over 
700,000 documents from the SIPRNET during a time of war 
and while deployed in Iraq in support of that war. 

Showing no loyalty to this nation, PFC 
Manning knowingly gave the enemies of the United States 
unfettered access to these Government documents and we 
now know today, Your Honor, as part of this court 
martial that at least two enemies, at least two enemies 
received the information; including Osama bin Laden, 
who at the time of his death was the most isolated and 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



166 

wanted enemy of the United States, and al— Qaeda in the 
Arabian Peninsula . 

Your Honor, the United States is confident 
that after reviewing all of the evidence, applying your 
own common sense knowledge of human nature and the ways 
of the world and specifically spending time focused on 
PFC Manning's own words in his chats that you will find 
him guilty beyond a reasonable doubt of all the charges 
and their specifications. 

Your Honor, PFC Manning was not a humanist; 
he was a hacker. A hacker who described his fellow 
soldiers as dikes, a bunch of hyper— masculine, 
trigger-happy, ignorant, rednecks or gullable idiots. 

Lamo chats, Your Honor, page 7 and 37, 7 
and 37. Assange chats, page 8. 

Your Honor, he was not a troubled young 
sole. He was a determined soldier with a knowledge, 
ability, and desire to harm the United States in its 
war effort . And, Your Honor, he was not a 
whistleblower ; he was a traitor. A traitor who 
understood the value of compromised information in the 



Provided by Freedom of the Press Foundation 



1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 



UNOFFICIAL DRAFT - 7/25/13 Afternoon Session 



167 

hands of the enemy and took deliberate steps to ensure 
they, along with the world, received all of it. 
Thank you, Your Honor. 

THE COURT: All right. Is there anything 
we need to address before we recess until 09:30? 
MR . COOMBS : No , Your Honor . 
MR. FEIN: No, Your Honor. 
THE COURT: Court is in recess. 
(Court recessed at 5:45 p.m.) 



Provided by Freedom of the Press Foundation 



United States vs. 

PFC Bradley E. Manning 



UNOFFICIAL DRAFT 
7/25/13 Afternoon Session 



- Vol.21 
July 25, 2013 



$ 



$1,000 (2) 

95:19;122:9 
$1,500 (1) 

69:14 
$1,800 (1) 

122:1 
$1.3 (1) 

25:11 
$1.8 (1) 

96:11 
$1.9 (1) 

26:19 
$10,000 (2) 

24:20;26:8 
$11 (2) 

122:2,4 
$145,000 (1) 

122:5 
$2,000 (1) 

96:7 
$3,000 (1) 

123:10 
$3,850,000 (1) 

26:21 
$50 (4) 

25:4,14;26:12,21 
$525,000 (1) 

70:1 
$7,000 (1) 

70:18 
$9(1) 

69:17 
$9.39 (1) 

70:3 



A 



ability (4) 

2:8;30:11;158:12;166:18 
able (9) 

14:1;17:1;19:10;65:18, 

20;87:21;140:12;146:2; 

148:10 
Aboul-Enein (4) 

135:5;156:12,20;157:16 
above (1) 

141:16 
above-titled (1) 

1:15 
absolutely (1) 

130:19 
abundantly (1) 

162:15 
abusing (1) 

53:6 
acceptable (1) 

38:19 
accepting (1) 

138:12 
access (38) 



10:6;21:12;33:5;42:11; 

45:17;46:12;48:19;49:3; 

50:3,9;52:5,14;53:6;56:20; 

58:3,5,14;67:18;80:10;82:5, 

8,18;83:6;94:8;102:20; 

111:19;120:16,18,19; 

124:11;158:15;160:17; 

161:1;162:5;163:1,15; 

164:3;165:17 
accessed (12) 

32:6,14,19;33:9;34:10; 

62:2;73:8;76:6;83:15; 

89:15,16;142:13 
accessible (5) 

83:5;86:14;129:12,14; 

145:14 
accessing (1) 

102:10 
accomplish (6) 

11:14;80:17;81:10;83:21; 

88:8;102:16 
accomplishments (1) 

20:10 
according (19) 

63:18;72:12;73:10;74:7, 

11;75:17;96:9;101:3; 

106:19;110:2;112:5;113:5; 

116:21;131:20;132:18; 

133:17;150:17;153:1;154:6 
accordingly (3) 

41:3;68:15;78:2 
account (22) 

44:3:48:7,9,11, 13,16,20; 

49:4;53:4,4,9, 13;56:9; 

57:10:58:9:85:10:116:17; 

118:12,19,19:119:10; 

121:13 
accounts (3) 

47:8;109:14;110:18 
accurate (2) 

2:9;148:10 
ACCUSED (10) 

3:10;31:3;34:9;45:19; 

57:12;70:7;72:8;76:8;95:6; 

122:19 
accused's (3) 

30:21;36:18;74:9 
achieve (1) 

38:4 
ACIC (27) 

27:2,14,18;28:1,16;29:3, 

21;31:6,18;32:4,9,12,15,15, 

19;33:8,10,13,14;34:2; 

126:21;128:1;129:9; 

142:12;143:10,16,17 
acknowledged (2) 

131:10:149:17 
acknowledgement (2) 

150:5;156:13 
acknowledges (1) 

140:18 
Acquire (2) 

114:5,10 



across (2) 

80:11:106:13 
act (3) 

117:5:148:16,18 
acted (2) 

130:6;135:19 
acting (1) 

80:1 
action (4) 

20:3;34:3;89:19;119:5 
actionable (2) 

29:16:30:12 
actions (23) 

19:10;28:21;33:19;34:14; 

35:16;40:18;42:6;77:6; 

118:2;120:10;123:17; 

131:10,21;132:16,20; 

133:19;136:2;139:3;149:4; 

150:4,20,20:151:2 
active (1) 

164:17 
actively (6) 

24:5;25:20;70:12;95:11; 

122: 14; 147:1 
activist (1) 

35:5 
activists (4) 

38:4;79:1;139:14;149:6 
activities (9) 

4:21;74:21;75:2;108:2; 

137:13;140:13;148:13; 

159:6;163:3 
activity (6) 

4:20;9:14;13:2;46:4; 

47:14;62:18 
acts (5) 

127:14;147:9;150:19; 

164:18,19 
actual (24) 

2:4;28:2;43:20;48: 12,18; 

49:9,10;63:4;68:7;128:1,9, 

13,20;129:3,11;135:12; 

136:4;138:18;140:1; 

141:18;143:2;145:21; 

147:8;150:20 
actually (16) 

12:16;36:19;37:12;41:13; 

50:3;52:2,20;84:11;88:21; 

100:12;101:8;113:10; 

130:10;145:3;150:10;165:5 
Adam (7) 

134:16;135:3;153:17,20; 

154:5,21;157:7 
add (3) 

96:21;99:3,17 
addition (1) 

141:5 
additional (3) 

117:16;119:4;141:17 
additionally (3) 

70:4;100:16;149:2 
address (31) 

32:14,19;63:5,13;85:21; 



108:7;109:12,15,17;110:4, 

14;111:19,21;114:1,5,17, 

21;116:10;117:20;118:5, 

13;119:11;120:16,19;121:1, 

10,14,17,20;122:7;167:5 
addressed (2) 

28:10;37:1 
addresses (6) 

32:19;108:19,21;111:1, 

1 1;1 18:8 
adjust (1) 

8:1 
Adkins (2) 

151:15,18 
administrative (2) 

50:5;151:19 
administratively (1) 

82:15 
administrator (3) 

32:13;50:2;99:4 
administrators (1) 

99:3 
Admiral (4) 

23:8;61:4,9;107:16 
admission (1) 

151:3 
admissions (2) 

151:2;165:3 
admitted (5) 

13:18;18:2;21:3;69:7; 

100:11 
admitting (1) 

165:2 
Adrian (12) 

14:3;20:20;59:20;84:14; 

116:18;120:1;131:4;149:3; 

158:3;160:21;161:12;162:8 
advance (1) 

38:5 
advanced (1) 

11:20 
advantage (2) 

76:10;149:20 
adversarial (1) 

123:7 
adversaries (12) 

23:5,7;29:16;30:7;36:12; 

112:9;120:2,4;138:2; 

139:13;143:7;160:17 
adversaries' (1) 

30:10 
adversary (3) 

112:12;137:15;138:4 
advise (1) 

80:19 
affect (3) 

77:5;131:11;149:7 
afford (1) 

87:4 
AFG (1) 

14:10 
Afghanis (1) 

19:20 



Min-U-Script® 



Provided by Freedom of the Press Foundation 



(168) $1,000 - Afghanis 



United States vs. UNOFFICIAL DRAFT - Vol.21 

PFC Bradley E. Manning 7/25/13 Afternoon Session July 25, 2013 



Afghanistan (24) 


allegiance (2) 


analyze (1) 


appreciated (1) 


4:7;9:2,12;10:9,15;11:19; 


151:4,11 


60:7 


143:9 


12:2,3,7,8,10,12,21;14:16; 


allow (4) 


analyzes (1) 


appropriate (1) 


19:21;24:7,13;29:5;103:11; 


11:5;83:13;98:1;115:7 


29:3 


38:19 


128:10;140:7,21;155:17,20 


allowed (5) 


anarchist (3) 


approval (1) 


again (13) 


83:18;87:8;88:2;96:18,19 


147:21;151:12;162:14 


97:2 


4:4;13:1;19:7;48:3;59:5; 


allows (3) 


anarchists (1) 


approve (1) 


63:5;71:21;74:13;79:12; 


82:10;89:7;115:17 


38:4 


41:12 


84:19;85:11;89:8;149:8 


all-source (2) 


anarchy (4) 


approved (1) 


against (12) 


81:11;136:17 


84:14,17:147:15,17 


53:3 


10:4;28:4;30:14;129:7; 


all-time (1) 


ANGEL (1) 


approving (1) 


137:18;143:2;156:3,7,13; 


132:6 


3:6 


41:10 


157:8;159:7;163:7 


almost (1) 


angles (1) 


approximately (7) 


agencies (3) 


162:15 


35:13 


25:11;26:19;63:18;69:14, 


148:9,13;163:3 


alone (1) 


angry (1) 


20;122:1,2 


agency (4) 


83:15 


132:2 


April (17) 


71:9;148:3,8,16 


along (4) 


Anica (2) 


29:6;43:2;66: 17;75:18, 


agenda (2) 


5:19;17:17;40:2;167:2 


6:18;7:11 


19;90:6,7;91:8;93:9;104:3; 


42:9;162:14 


Alpha (9) 


annotate (1) 


105:3,7,9,11,12;128:3; 


Agent (60) 


15:14,19;31:15,16,21; 


32:3 


129:1 


12:19;13:16,19;14:14,21; 


74:18,18;75:6;78:15 


annotated (2) 


AQAP (1) 


17:1;32:2;48:8;49:6,14; 


al-Qaeda (28) 


56:11:105:13 


159:10 


50:13,20;51:4,7;52:1,4; 


134:13,13,17,18;135:7, 


announcements (1) 


AR25-2 (8) 


53:7;54:5,14,16;55:14; 


13;137:8;138:7;142:2,2; 


42:3 


52:9;64:19;99:17;100:18; 


56:21;58:4;62:11,14;63:6, 


146:18;147:6;152:9,9,16, 


anonymize (1) 


101:6;109:20;110:2;118:15 


10;64:1,5,16,21;65:8;72:12, 


16;153:6,9,17;156:14,21; 


48:20 


Arabian (11) 


17;73:4,19;79:8;83:4,17; 


157:1,2,4,19:158:21; 


anonymously (1) 


134:13,18;135:7,13; 


84:21;85:9,12,20;87:14,16; 


159:12;166:1 


145:16 


142:2;146:18;152:10,17; 


88:14,21;89:6,9;93:14; 


alteration (1) 


answered (1) 


158:21;159:12;166:2 


101:20;104:2,21;109:7; 


136:15 


82:14 


archiving (2) 


114:12;115:15;116:2,9,16; 


although (8) 


anticipated (1) 


159:9,11 


128:18 


18:7,20;33:9;36:5;37:12; 


10:14 


area (4) 


ago (3) 


43:13:116:15;151:16 


anti-government (1) 


7:4,5;81:5;109:5 


43:19;112:2;151:20 


always (4) 


38:3 


areas (2) 


agreements (4) 


137:14,14;138:3,3 


anti-US (1) 


81:8;95:16 


107:5;138:11, 12,18 


ambassador (1) 


141:13 


argue (1) 


ahead (2) 


77:5 


AO(l) 


105:5 


125:6,13 


amendments (1) 


10:19 


argued (1) 


aid (3) 


125:15 


Apache (26) 


8:13 


34:14;87:14;135:18 


America (1) 


34:20;35:3,9,10,12;36:6; 


arguing (1) 


aiding (1) 


81:3 


39:13,14,18;40:6,10;42:17, 


102:10 


134:1 


American (2) 


21;105:12,18,20;128:4; 


argument (5) 


aids (1) 


150:12;151:8 


129:10;134:3;152:15; 


23:20;71:17;125:12,21; 


6:5 


among (1) 


153:15,18;154:1;156:19; 


126:2 


air (5) 


69:6 


157:4;159:19 


arms (1) 


107:21;120:6,8;161:17; 


amount (4) 


appeal (2) 


119:16 


163:19 


33:16;91:4;130:2;150:17 


151:19,20 


ARMY (23) 


aircraft (1) 


amounts (1) 


appear (3) 


1:2,7,9;28:7;29:2,5,12; 


35:14 


159:9 


78:10;106:9;117:14 


69:13;98:1,10,10,11;99:11; 


airstrike (1) 


ample (1) 


APPEARANCES (1) 


102:16;118:18;119:2; 


103:9 


116:16 


3:1 


124:4;132:13;133:18; 


AIT (2) 


analysis (6) 


Appellate (9) 


136:18;143:18;148:18; 


37:18;137:2 


6:12:28:16:140:11,17; 


23:18;27:11;70:8;71:15; 


165:7 


al-Assad (2) 


144:9;158:14 


72:2;95:7;96:13;122:18; 


Army's (1) 


153:16;154:20 


analyst (12) 


123:14 


53:2 


ALEXANDER (1) 


28:14;38:20;81:8,11; 


applied (1) 


around (5) 


3:8 


106:18;111:6;136:7,8,17; 


18:10 


72:16;113:7;115:21; 


algorithm (5) 


147:4;149:16;165:8 


applies (1) 


131:6;149:9 


46:10;49:14,17;55:1,1 


analysts (7) 


156:15 


arraignment (1) 


all-aCCcSS yl) 


s-1 s-fi- 1 • 1 1 • s -fin-on- 

J. 1 o,0. 1,1 1. J,OU.ZU, 


app'ymg W 


1ZJ. 15 


113:11 


106:18;112:14;158:13 


166:4 


arrest (1) 


alleged (1) 


analytic (1) 


appointed (1) 


40:9 


163:2 


140:2 


79:15 


arriving (1) 



Min-U-Script® 



Provided by Freedom of the Press Foundation 



(169) Afghanistan - arriving 



United States vs. 


UNOFFICIAL DRAFT 


- Vol.21 


PFC Bradley E. Manning 


7/25/13 Afternoon Session 


July 25, 2013 


139:21 


attacks (7) 


aviation (1) 


becoming (1) 


ART (1) 


8:2;24:11;26:4;98:17; 


36:1 


20:5 


147:7 


156:3,13,15 


avoided (1) 


began (6) 


Arteli (1) 


attempt (4) 


139:17 


11:1;64:6;76:20;84:18; 


32:12 


62:20;63:3,11;65:21 


aware (3) 


103:7;128:16 


Article (2) 


attempted (6) 


140:15,16;152:18 


beginning (5) 


134:9;155:7 


52:15,20;54:1,8;58:9; 


away (3) 


32:20;33:3;60:1;71:6; 


articles (1) 


62:7 
attempting (1) 


19:10;101:18;165:5 


132:9 
begs (1) 


43:9 




articulated (1) 


137:9 


B 


4:17 


74:17 


attempts (4) 




BEHALF (2) 




ASHDEN (1) 


49:3;62:9;63:15,16 


back (7) 


3:3,10 


3:4 


attention (6) 


27:6;38:9;41:1;54:3; 


behind (6) 


Asia (1) 


33:19;40:13;41:2;43:14; 


83:10;90:13;93:18 


48:12,15,18,21;92:20; 


81:3 


60:4; 144: 11 


background (2) 


118:2 


aside (1) 


attitude (1) 


101:21;135:7 


belonged (1) 


162:20 


44:5 


backs (1) 


118:19 


ASP (1) 


attributable (1) 


133:9 


belonging (1) 


32:7 


48:10 


backup (8) 


71:8 


Assange (35) 


audio (2) 


2:7;12:12,14;91:15,16; 


beneficial (1) 


33:18,21;34:8;47:19,21; 


2:7;42:4 


92:3;93:4,12 


157:2 


49:5;53:16,19;54:1, 12,17; 


audio/video (1) 


bad (1) 


benefit (5) 


55:11;56:8,12;57:9;58:11; 


2:6 


49:15 


8:7;22:5;68:11;94:21; 


59:17;66:5,7,10,14;69:2; 


audit (1) 


Baghdad (3) 


124:18 


77:1;116:19;127:4,7,13; 


47:14 


80:20:81:1,6 


benefits (1) 


148:4,5,6;151:2;162:2; 


August (2) 


Balonek (2) 


36:12 


163:2,8;166:15 


92:17;128:19 


38:16;143:12 


best (3) 


Assange's (1) 


aunt (2) 


banner (3) 


84:6;87:9; 100:5 


145:1 


15:20;44:1 


78:11:106:13,16 


Bettencourt (2) 


assess (4) 


aunt's (4) 


bar (2) 


79:8;128:18 


29:1;30:7;42:1;143:7 


15:1;17:18;19:15;21:15 


83:7;84:4 


better (3) 


assessment (2) 


AUP (1) 


Base (2) 


66:2;148:8;156:7 


60:9;129:2 


64:10 


1:10;69:15 


beyond (2) 


assessments (3) 


aussie (1) 


Base64 (3) 


135:21;166:8 


28:14;59:12;69:19 


161:20 


90:18,19;91:12 


Bigelow (3) 


assigning (1) 


authenticity (2) 


based (19) 


113:5;116:15;118:20 


138:17 


34:2,5 


6:15;10:13,14;16:10; 


Bigelow's (1) 


assist (2) 


author (2) 


25:9;26:17;37:18;44:9; 


116:11 


80:19;162:6 


37:14;45:4 


70:2;77:1;96:3;113:17; 


biggest (2) 


assistance (4) 


authority (5) 


138:17;140:1;150:19; 


41:2;42:15 


49:4;53:21;54:8;56:7 


31:17;97:6;99:2,21;107:8 


151:2;152:8;156:17;158:14 


bin (11) 


assisted (1) 


authorization (3) 


basic (5) 


8:21;117:17;135:1;137:8; 


38:11 


78:12;96:20;97:16 


30:5;115:15,15;116:3; 


139:10;153:2,13;154:5,7; 


associated (5) 


authorize (1) 


142:14 


158:6;165:20 


32:14;39:19;122:7;123:1, 


99:13 


basis (2) 


black (2) 


6 


authorized (26) 


6:14;59:10 


55:3,16 


assume (5) 


21:11, 13;64:10;67:17,19; 


batch (7) 


Blah (4) 


107:7;137:14,14;138:3,3 


75:2;94:7,9;96:15;97:12,13, 


13:9,12;83:14;89:7,7,10; 


73:20;74:4,9,11 


Assuming (2) 


14;98:12;99:8,11,20; 


115:8 


B-L-A-H (1) 


69:16;122:3 


100:20;101:6,8,9;102:13, 


battle (1) 


73:21 


asymmetric (3) 


17;124:10,12;129:17,19 


155:15 


blemish (1) 


4:13;18:19;141:3 


authors (2) 


battlefield (2) 


132:21 


atmosphere (1) 


52:9;98:21 


18:19:165:10 


block (1) 


132:1 


automated (2) 


BE22PAXwmv (1) 


123:3 


attached (1) 


99:9;115:19 


103:8 


bloop (2) 


153:9 


automatically (2) 


BE22PAXzip (3) 


92:4,7 


attachments (1) 


88:18;120:19 


103:16,19;105:2 


board (1) 


16:19 


available (18) 


beautiful (2) 


151:19 


attack (10) 


7:16;12:11;21:10;22:16; 


147:15,17 


boasts (1) 


5:6,8,9,10,11:98:11; 


Jl. 1 f¥+. /,1U,0/.j,oU.^> 


become (1) 


163:9 


112:8;120:3;131:7;149:10 


103:16;108:5;109:6;131:9; 


8:2 


bold (1) 


jittjipkiiifF 

ullutlVlll^ V / 


136:14;149:12;158:18,19; 


becomes (1) 


55:3 


98:10 


159:13 


112:17 


book (6) 



Min-U-Script® 



Provided by Freedom of the Press Foundation 



(170) ART - book 



United States vs. 


UNOFFICIAL DRAFT 


- Vol.21 


PFC Bradley E. Manning 


7/25/13 Afternoon Session 


July 25, 2013 


37:9,11, 17;45:2,7;112:18 


43:13 


18:8;97:20;99:10;132:16 


141:13 


boosts (1) 


browser (12) 


camera (2) 


causing (2) 


156:14 


47:10;82:10,14;83:9,10, 


19:16,16 


68:15;95:1 


boot (2) 


19;86:14,18,20;88:5;89:15; 


can (22) 


cavalier (1) 


50:14;52:6 


102:14 


6:3;8:1;33:8;50:2;54:18; 


44:5 


bootable (1) 


built-in (1) 


55:16;58:18;61:19;77:17; 


CD (14) 


51:1 


53:1 


82:5,18;83:11;98:15,18; 


50:14;51:2,5,6,13;52:7, 


booting (3) 


bulletin (1) 


107:14;116:5;123:5; 


19;57:19;58:6;74:12;92:15; 


52:18;57:21;58:6 


99:21 


145:18;156:5;157:4; 


96:19;117:10;119:10 


boss (1) 


bunch (2) 


158:15;164:13 


ceased (1) 


152:1 


38:3;166:12 


candid (1) 


94:2 


Boston (5) 


burned (5) 


157:21 


Centaur (2) 


15:8,10;16:14;17:16,20 


39:18;43:16;51:11;74:12; 


capabilities (2) 


13:1,7 


both (13) 


92:14 


52:10;154:15 


CENTCOM (13) 


12:6;22:21;23:10;73:16, 


burning (2) 


capable (3) 


9:9;12:5;23:8;44:12; 


21;74:20;85:3;91:1;95:7; 


51:21;119:10 


42:7;97:19;136:20 


103: 12,20; 104:8,9, 14; 


96:20;98:17;107:12;140:4 


button (1) 


capacity (1) 


105:4;106:11;107:17; 


bottom (10) 


82:21 


98:9 


110:16 


11:12;31:12;54:13,20; 


bypass (9) 


CAPTAIN (21) 


center (1) 


55:16;56:6,14;66:21;87:17; 


50:7;52:20,20;57:16; 


3:5,6,7,8,12;6:11,13;9:21; 


75:20 


106:8 


58:9;83:21;87:10;88:3;99:8 


38:15,18;43:14;64:11; 


Center's (2) 


box (3) 


bypassed (1) 


80:15,18,21;82:17;83:17; 


28:8,10 


23:16;70:8;122:18 


58:1 


98:6,17;143:12,12 


Centric (1) 


bradass87 (1) 


bypassing (2) 


capture (1) 


95:13 


75:18 


52:10,12 


4:21 


century (3) 


Bradley (3) 


bz2 (1) 


captured (9) 


4:13;35:10;141:3 


1:6;73:13;74:5 


13:16 


4:20;5:3,5;7:1,9,10;9:18; 


certain (6) 


bragged (1) 




13:2;47:14 


5:20;10:3;48:2;134:3; 




66:13 


c 


captures (2) 


152:14;154:15 


branch (3) 




73:2;157:20 


chain (1) 




28:14;61:14;69:9 


C3(5) 


capturing (1) 


88:18 


Bravo (5) 


126:21;145:5,7,11,20 


47:10 


Chamberlain (1) 


15:14,19;153:12,13; 


cable (20) 


card (14) 


32:18 


155:3 


40:3;76:21;77:4,15,19; 


4:15;13:17,20;14:19,21; 


chambers (2) 


Bravos (1) 


78:11, 13,19;82:11,11;83:6, 


15:5,5;17:17;18:1;19:16; 


125:5,13 


111:16 


9,9,18;86:18,19,19;89:15; 


20:6,9,12;21:15 


chance (1) 


breach (1) 


90:17;91:20 


carrying (1) 


47:14 


131:18 


cables (68) 


8:2 


change (3) 


breached (2) 


34:10;36:21;45:21;76:13, 


Carter (2) 


56:18;97:4;150:11 


53:1;57:12 


17;77:13,16,21;78:2,9,9,17, 


80:1;82:4 


changed (1) 


break (1) 


17,21;79:4,9,12,16,20; 


case (8) 


47:9 


162:19 


81:13,21;82:6,9,19;83:1,16; 


12:15;28:18;37:5;54:4; 


channels (1) 


bridging (1) 


84:2,3;86:11;87:5,11;88:1, 


66:19;110:10;117:10; 


75:16 


163:19 


14;89:3,16,18;90:2,5,9,14; 


123:16 


characterize (1) 


brief (2) 


91:9,11;92:18;93:7,8,10,13, 


cases (1) 


66:15 


97:5;139:7 


19,20;94:12,15;95:1;96:5; 


112:6 


Charge (39) 


briefed (2) 


102:12;103:1;128:17,19; 


casualties (1) 


4:8;22:9,10,19;23:9; 


6:14;131:21 


134:4;149:7;152:14;153:7; 


5:8 


27:17,18;28:16;30:17; 


briefings (2) 


154:9,12;155:1,4;157:15, 


casualty (1) 


34:20;45:10,13;47:1;59:11, 


10:13;140:5 


20;159:19 


103:13 


12;64:20;71:3,10;74:15; 


Briefs (3) 


calculated (1) 


cataloged (1) 


76:15,15;103:4,5;106:3; 


59:12;60:10;129:3 


164:20 


91:19 


107:9;108:8,9,9,14;109:14, 


brigade (3) 


call (2) 


catenate (1) 


19;125:15,18;126:5,11,11, 


100:9;132:13,18 


108:18;155:15 


89:1 


13;130:5;131:15 


bring (1) 


called (19) 


caught (2) 


charged (12) 


88:6 


4:2;18:2;20:21;25:1; 


58:16;165:6 


22:18;28:10;34:19;37:2; 


brings (1) 


26:10;48:4;49:12,14;51:3; 


cause (8) 


66:19;71:2;72:3;78:8; 


115:5 


54:14;55:5,8;59:3;70:19; 


23:2,12;31:4;61:5;75:4; 


79:11;106:6;107:13,20 


broken (1) 


84:11;85:21;90:18;125:8; 


79:14;107:14;127:18 


charges (3) 


46:9 


i4y. j 


/\ * k lit' a \ r 1 / /■ \ 

CallScQ y*) 


109:20;125:18;166:8 


brothers (1) 


calling (1) 


105:20;128:2;130:7; 


Charlie (7) 


119:16 


157:7 


133:19 


78-7 7 7-79-13-1 54-1 3 


brought (1) 


came (4) 


causes (1) 


19;155:3 



Min-U-Script® 



Provided by Freedom of the Press Foundation 



(171) boosts - Charlie 



United States vs. UNOFFICIAL DRAFT - Vol.21 

PFC Bradley E. Manning 7/25/13 Afternoon Session July 25, 2013 



charts (1) 


4:7;12:8 


clearly (2) 


17;135:5;156:11, 12,20; 


162:13 


circumstances (3) 


34:7;144:20 


157:15 


chat (13) 


98:11;103:13;130:8 


click (10) 


commanders (5) 


33:18;54:12;55:21;56:15; 


circumstantial (2) 


11:11, 15;42:14;62:12,14; 


5:15;6:9,20;8:15;99:21 


84:16;99:20;100:3;101:8; 


117:21;141:17 


82:21;83:7,8;86:18;87:18 


commands (1) 


102:1,2;127:4;158:3; 


circumvent (2) 


clicking (6) 


89:6 


161:13 


57:18;88:3 


65:4;83:12;84:4,5;86:15; 


commercial (2) 


chats (33) 


circumventing (1) 


116:6 


148:11;161:17 


14:3;21:2;34:8;45:2; 


50:6 


Clinton (3) 


committing (1) 


46:9;47:19,21;53:16;55:10; 


civilian (1) 


131:5;149:9;158:4 


127:5 


56:7,11;66:5,10;81:14; 


103:13 


close (1) 


common (3) 


127:6,13;131:11;147:19; 


civilians (1) 


107:21 


139:15,18;166:5 


148:4,5;149:2;150:14; 


119:17 


closed (1) 


commonly (2) 


151:1, 1;160:21;162:2; 


claim (1) 


72:19 


160:6,8 


163:8;164:11,15;165:2; 


164:8 


closely (4) 


communicate (1) 


166:7,14,15 


claimed (3) 


22:16;36:18;48:17;78:4 


29:8 


chatted (2) 


45:3;77:5;163:2 


closely-held (4) 


communicating (2) 


53:18;57:8 


claiming (1) 


67:6;76:17;109:4;162:18 


36:12;77:21 


chatting (1) 


140:20 


closing (5) 


communication (1) 


54:17 


clandestined (1) 


23:19;124:21;125:12,20; 


145:13 


check (1) 


43:13 


126:2 


communications (1) 


97:1 


clarification (2) 


clue (1) 


118:6 


Cherepko (3) 


144:19;145:3 


162:9 


community (3) 


38:18;98:6,17 


Class (4) 


code (7) 


36:1;80:9;154:15 


Chief (26) 


6:18;7:11;10:20;11:9 


63:4,5,7,12,16;64:12; 


Company (2) 


35:8,20;36:11;38:16; 


classic (1) 


108:2 


1:8;155:16 


44:11;69:9;96:17,20;98:3,8, 


11:12 


coincidence (2) 


compared (1) 


15,17;101:17;102:1;110:6, 


classification (6) 


108:10,16 


43:14 


20;112:5;113:3;118:3; 


31:17;91:1;106:8,20; 


Collateral (3) 


competent (1) 


120:14,14;121:7,12,18,19; 


107:6;154:18 


41:6;43:10;105:16 


107:8 


143:12 


classified (94) 


colleagues (2) 


compilation (1) 


China (2) 


18:8;19:6;21:10;22:1,11, 


38:21;107:1 


18:12 


149:18;150:16 


12;23:11,17,19;24:13,15; 


collect (2) 


compilations (1) 


choose (1) 


25:2;26:6,11;27:3,20;28:3; 


27:8;62:10 


30:11 


98:18 


29:6,14,19;30:1,8;31:1,1, 


collected (2) 


complete (7) 


chooses (1) 


13,16,20;34:4,6,15;36:6; 


153:4;154:9 


16:7,9;30:11;62:8;63:8, 


98:19 


44:8;53:6;59:15;60:16,18; 


collection (3) 


13;115:19 


chose (6) 


61:7,12;64:8;67:17;68:6,19, 


30:13;119:20;138:21 


completed (5) 


10:6;81:12;127:15;146:6, 


21;70:16,20;71:5,16;74:16; 


collectively (1) 


21:7;67:15;94:5;124:8; 


19;149:18 


75:16;76:17;78:2;94:6,17; 


132:21 


132:7 


Christmas (2) 


95:4,16,20;106:4,19;107:3, 


colloquy (1) 


completely (3) 


33:11;106:2 


7,18;108:5;113:13;117:7; 


2:17 


22:7;68:12;132:17 


Christopher (1) 


123:2,12;126:6;129:18,19; 


colon (1) 


complex (1) 


111:5 


130:15;131:8;136:21; 


143:17 


88:8 


CHU (1) 


137:2;138:14;139:1;142:7, 


Colonel (18) 


complicated (1) 


56:16 


21;145:19;146:10;149:11; 


1:17;6:14,16;22:21;34:1; 


49:13 


CIDNE (25) 


150:2;152:5;153:11; 


67:7;100:2,4;107:12; 


compound (2) 


4:7;9:2,8;11:4,12,18; 


154:11;160:3,7,18;161:1,9, 


131:16,16,20;132:4,18,18; 


153:3;154:8 


12:2,6,10,20;13:14;20:7; 


15,17;162:4,11;163:1 


133:3,10,17 


compressed (1) 


21:1,7,9,17;22:6;24:6;39:5, 


classifies (1) 


combat (1) 


91:11 


6;43:20;82:21;1 14:2,4,9 


114:9 


107:21 


compressing (1) 


CIDNE-A (23) 


Clawson (1) 


combinations (1) 


161:18 


4:15;10:9;11:16;12:17; 


152:1 


2:15 


compromise (14) 


13:5,12;14:7,20;21:3; 


clear (9) 


combine (1) 


33:14;36:2;68:7;77:9; 


23:11;24:1,21;25:8,11; 


18:10;20:9;33:19;55:19; 


9:11 


84:10;103:21;105:7; 


128:6;134:4;152:13,21; 


86:8;115:3;122:12;154:14; 


Combined (1) 


106:12;112:21;127:15; 


153:10;155:10,11;156:2; 


162:15 


9:7 


146:6;149:6;152:5;154:17 


159:18 


clearance (2) 


command (4) 


compromised (22) 


CIDNE-I (12) 


38:20;113:12 


65:11;88:19;89:19; 


24:21;27:13;35:1;38:9; 




Clearances y±) 


i m • 1 q 


ou.o, / 1 .o, /o.y, / v. i^, 


25:16,21;26:8,9,16,19; 


112:13 


commander (16) 


81:18;93:20;103:8;111:18; 


128:12 


clearing (2) 


5:18;6:3,5,11;22:21;23:9; 


126:5,7,15;127:11;130:14; 


CIDNE-Iraq (2) 


48:1,3 


60:12;99:12;101:9;107:11, 


131:1;139:4;143:21; 



Min-U-Script® 



Provided by Freedom of the Press Foundation 



(172) charts - compromised 



United States vs. UNOFFICIAL DRAFT - Vol.21 

PFC Bradley E. Manning 7/25/13 Afternoon Session July 25, 2013 



147:11;166:21 


34:5;56:3 


113:13 


161:20;162:3 


compromising (7) 


conflicted (1) 


continued (2) 


coupled (1) 


18:8;40:10;61:5;76:20; 


20:3 


1:16;20:17 


146:16 


103:18;113:13;142:7 


connected (5) 


continuing (1) 


course (2) 


computer (95) 


12:20;13:5;90:4,12; 


161:10 


58:14;93:15 


12:20;13:5;15:4,12,15; 


119:14 


contractor (1) 


court (48) 


16:3,13,17;17:3,5,9,12; 


connecting (2) 


97:3 


2:2,13;4:2,3,4;6:19; 


20:12;21:7;32:11;39:3,20; 


43:20; 104: 18 


contrary (1) 


23:18;27:11;58:21;59:2,3,3, 


40:1;43:11;47:5;50:7,10, 


connection (3) 


12:18 


4,5;61:8;62:4,16;70:9; 


14;52:6,19;53:3,10,20;56:8; 


108:11, 17;120:8 


contravention (1) 


71:14,18;72:20;92:5,21; 


57:16,21;58:13;64:6,8,14; 


connections (1) 


34:3 


93:2;95:8;96:13;97:20; 


65:5,9;67:15;68:21;69:1; 


90:1 


control (1) 


108:13;114:19;122:19; 


72:10,15,16;73:3,15;74:10; 


consequences (1) 


2:8 


123:14;125:1,3,7,8,8,10,14; 


76:2,3,4;84:20;85:8,15,17; 


139:3 


controls (1) 


126:10;127:20;128:7,17; 


86:7,10;87:3,17;88:4,7; 


conservative (3) 


163:10 


152:18;165:18;167:4,8,8,9 


89: 1 1 ;90:4, 1 2, 1 6;9 1 :5 , 1 6; 


25:1;26:10;70:20 


conversation (1) 


COURT-MARTIAL (1) 


92:12,15;94:4,10;96:16,18; 


considered (1) 


164:12 


1:6 


98:13;99:13;100:13,20; 


4:17 


convert (1) 


courtroom (1) 


102:6,7,15,18,19;104:6,13, 


considering (1) 


90:17 


2:4 


15,17;114:14;117:2,10,15, 


106:1 


converted (4) 


covering (1) 


18;119:12,14;124:6,8; 


consistent (1) 


21:16;55:5;68:1;94:11 


47:3 


143:20;161:18 


44:4 


converts (2) 


covert (3) 


computers (10) 


consisting (1) 


49:11;57:3 


132:16;148:13;163:2 


48:6,9;49:1;97:6,12;99:5; 


106:6 


conveyed (3) 


cracking (4) 


110:3;116:11;118:9;140:8 


consists (2) 


21:18;68:1;94:12 


45:10;53:12;56:1,8 


computer's (2) 


9:14;122:11 


convoy (2) 


craved (2) 


49:18,19 


constant (2) 


5:2;6:7 


40:13;105:21 


conceal (1) 


10:18;127:10 


cool (1) 


crazy (1) 


53:5 


constituted (2) 


38:2 


161:19 


concern (1) 


96:4;99:7 


COOMBS (2) 


create (14) 


47:18 


constructing (1) 


3:11;167:6 


12:14;51:1;70:1;79:19; 


concerns (1) 


150:18 


cooperation (2) 


84:14,16;89:12;121:13,16; 


74:21 


contact (4) 


61:3;157:17 


122:5,6;133:20;157:18; 


concludes (1) 


108:21;110:11;144:15; 


copied (5) 


158:1 


30:5 


145:1 


20:12;44:18;85:14;89:4; 


created (16) 


condenses (1) 


contain (5) 


102:19 


13:20;20:14;54:4,16; 


90:20 


2:13;36:21;60:16;76:16; 


copy (11) 


72:17;74:5;80:6;86:4;92:3, 


conduct (5) 


78:3 


23:18;43:16;50:21;51:5; 


5,10;113:19;121:19;139:7; 


36:19;78:5;118:15; 


contained (27) 


86:10;88:11,15,15;102:17; 


149: 14; 162:8 


128:21;130:9 


11:4;23:1;24:5;25:20; 


125:17;139:6 


creating (6) 


conducted (6) 


31:2;32:7;37:8,21;67:12; 


correlate (2) 


28:8;69:21;99:7;114:3; 


42:18,20;46:2;55:4;96:1; 


70:12;74:17,20;75:7;76:13; 


6:20;8:6 


121:8;147:14 


140:5 


77:19;78:11,18;79:13; 


corroborates (1) 


creation (1) 


conducting (6) 


95:11;107:13,20;121:1; 


118:1 


69:12 


35:17;77:21;103:12; 


128:9;129:11;143:19; 


cost (2) 


credentials (1) 


137:10;144:3;145:8 


155:1;160:7 


69:21;122:5 


53:5 


conducts (1) 


containing (9) 


counsel (2) 


credits (1) 


158:14 


10:8,9;14:8,19;25:4; 


125:5,12 


41:10 


confidence (1) 


26:13;32:15;128:13;129:3 


counseling (1) 


crimes (2) 


138:16 


contains (2) 


151:7 


150:13;165:2 


confident (1) 


35:21;155:11 


Counterintelligence (5) 


criminal (2) 


166:3 


contemporaneously (1) 


28:8,13;29:1,11;142:19 


109:15;127:14 


confidential (1) 


127:6 


counterterrorism (1) 


criteria (1) 


79:17 


content (5) 


70:15 


129:20 


configured (1) 


14:2;35:7;37:16,16;50:3 


countless (1) 


critical (2) 


50:15 


contents (5) 


113:1 


7:13;140:10 


confined (1) 


20:13;50:17;52:3;59:16; 


countries (5) 


crowd (1) 


44:3 


78:17 


24:4;25:19;70:11;95:10; 


132:1 


confines (1) 


contested (1) 


122:14 


crumble (1) 


1 1 Q'7 
1 Ly. 1 


1 JJ. 1U 


country yid) 


LJJ. 10 


confirmed (1) 


continue (9) 


24:20;26:7;34:18;42:12; 


CSQ (1) 


34:2 


6:6;24:16;27:9;29:20; 


70:17;79:2;95:18;96:6; 


14:15 


confirming (2) 


53:5;71:15;109:3;112:6; 


123:9;147:3;148:19; 


CSV (4) 



Min-U-Script® 



Provided by Freedom of the Press Foundation 



(173) compromising - CSV 



United States vs. 


UNOFFICIAL DRAFT 


- Vol.21 


PFC Bradley E. Manning 


7/25/13 Afternoon Session 


July 25, 2013 


14:9,10,11,12 


128:7 


126:1;150:9;151:1 


37:16 


current (1) 


dated (2) 


defense's (1) 


describe (2) 


71:4 


72:4;93:7 


67:7 


9:18;37:9 


currently (1) 


dates (3) 


definition (1) 


described (8) 


9:5 


72:4;75:11;79:10 


4:19 


46:7;69:3;78:16;123:17; 


cyber (4) 


DAVID (3) 


defy (1) 


148:7;155:4;161:16;166:11 


28:13;141: 13;143: 10; 


3:11;61:4,9 


165:11 


describes (1) 


144:15 


Davis (1) 


delete (2) 


28:19 




67:8 


117:12,17 


describing (1) 




D 


day (13) 


deleted (2) 


78:11 




5:16;6:9;9:5;41:1;56:18; 


16:12;109:13 


description (2) 




D6-A (11) 


74:3;81:17;92:15;105:3; 


deleting (1) 


41:14;111:4 


12:15;39:19;48:9;52:19; 


108:11, 17;130:17;161:2 


117:16 


deserved (1) 


53:3;65:5;87:2;97:3,12; 


days (13) 


deliberate (11) 


40:18 


99:18;102:14 


13:7,12;14:17;19:1,2; 


45:1;54:6;57:18;123:17; 


design (1) 


DAB (10) 


33:5;43:1,16;83:1;90:9; 


136:2;147:9;152:4;162:18; 


12:3 


61:14,21;62:2,20;67:8; 


121:15;160:14;161:2 


163:16;164:17;167:1 


designed (2) 


69:8,9,10,12,19 


DC (1) 


deliberately (6) 


57:17;80:8 


DABs (42) 


77:18 


10:6;28:5;45:6;124:1; 


desire (1) 


59:12,14;60:9,11,11,16, 


dealing (1) 


134:2;135:19 


166:18 


21;61:5,5,11,14,18;62:10, 


10:12 


delivered (1) 


desired (2) 


12;63:15;65:15,17;66:4,8,9, 


death (2) 


69:3 


150:8;163:16 


12,15,18,19,21;67:1,3,14, 


79:2;165:21 


demander (1) 


desires (1) 


16;68:1,4,6,12,16;69:21; 


debate (1) 


61:10 


119:9 


70:1,3,4,12,13;84:7;129:2 


148:17 


demonstrate (1) 


desktop (1) 


daily (2) 


decades (3) 


61:1 


73:13 


136:7;165:4 


76:17;79:10;81:12 


demonstrative (1) 


desperately (1) 


damage (3) 


December (13) 


87:14 


40:15 


31:5;61:6;155:12 


10:21;32:10,16,16;33:9; 


Denise (1) 


despite (2) 


dangerous (1) 


38:9,14;46:5;62:1,5; 


1:18 


49:4;165:1 


130:10 


126:20; 142: 16; 144:4 


density (1) 


destroy (1) 


dangers (2) 


decide (5) 


156:10 


39:4 


30:19;137:3 


6:6,16;34:17;86:20;105:8 


denying (1) 


detail (3) 


dat (3) 


decided (4) 


34:5 


5:12;28:19;136:19 


73:2,6;104:12 


38:3;50:7;86:18;158:17 


Department (31) 


detailed (6) 


data (29) 


deciding (1) 


77:12,16,17;78:16;79:18; 


24:13;26:5;64:19;70:16; 


8:12,14,14;9:7;13:2; 


154:17 


80:2,3,9;82:7;84:13;87:11, 


95:16;123:2 


30:11;52:21;63:3,10;72:14; 


decision (1) 


21;90:1,4;92:18;103:1; 


detailing (1) 


92:12;96:2;98:18;1 17:8,9; 


163:21 


110:21;128:16;134:3; 


20:15 


140:9,10;141:16;147:2; 


decision-making (1) 


149:6;152:14;153:6;154:3, 


details (3) 


149:19;150:1;156:1; 


8:15 


9,11,21;155:4;157:14,20; 


131:1,3;156:2 


158:12,15,15;159:16; 


decisions (5) 


159:18;164:8 


detained (1) 


161:15,16,18 


5:16;6:10;8:5,16;162:18 


depended (1) 


10:1 


database (50) 


declared (1) 


148:21 


Detainee (4) 


9:2;10:8,9;11:13,19;12:2, 


138:15 


depicted (1) 


59:12;60:9;69:18;129:2 


10;13:10,12;21:4,7;24:1,21; 


declassified (1) 


37:2 


detainees (2) 


25:8,11, 16,21;26:9,16,19; 


27:19 


depicts (2) 


60:13;129:4 


59:18;62:7;65:15,16,19; 


deconflict (1) 


35:11,13 


detainee's (1) 


70:13,19;76:13,16;77:9,10; 


111:2 


deploy (1) 


60:13 


78:10;82:3,6;86:13;87:7; 


deconfliction (1) 


155:17 


determination (1) 


88:1,12;95:13,20;96:10; 


112:7 


deployed (7) 


94:1 


102:11, 12;128:6,12;129:10, 


decrypting (1) 


12:1;98:5,7;119:17; 


determine (3) 


10,11;152:13;153:10 


53:12 


132:12;162:16;165:14 


7:3,8;57:4 


databases (16) 


default (1) 


deployment (9) 


determined (5) 


11:3,4,16;13:14;14:8,20; 


47:9 


7:1,12;60:2;97:5,7; 


25:6;26:14;44:18;156:10; 


20:18;21:1,9,17;22:6;39:5, 


defeat (3) 


130:15;140:4;146:5;160:12 


166:17 


6;130:21;152:6;161:9 


5:12;6:10;8:5 


deployments (1) 


develop (2) 


dataset (4) 


defense (24) 


132:12 


30:12;156:6 


4:6;59:7;76:12;103:3 


8:13;12:13,16;16:15,15; 


deprived (3) 


developed (1) 


datasets (1) 




ZZ. / /4-U. 1 / ,Oo. 1 J 


142:5 


23:10 


36:15;67:8,10;70:9;74:17; 


deputy (2) 


devoted (3) 


Hate (S» 

LI < lit J 


75:4;80:3;95:8;96:13; 


23:8;107:16 


21 -21 -68-5-94-16 


6:19;16:13;46:14;62:4; 


107:10;110:21;122:17; 


derived (1) 


died (1) 



Min-U-Script® 



Provided by Freedom of the Press Foundation 



(174) current - died 



United States vs. 


UNOFFICIAL DRAFT 


- Vol.21 


PFC Bradley E. Manning 


7/25/13 Afternoon Session 


July 25, 2013 


9:5 


37:19;43:17;59:16;66:8; 


126:6;127:7,11,15;129:18; 


due (1) 


different (16) 


125:14;142:13;144:3;145:6 


130:15,16,16,17,17;136:2; 


2:17 


6:7,13;11:3;14:5;52:18; 


discussing (3) 


141:1;143:1;146:8,13,16; 


duly (1) 


57:21;86:2,3,3;89:10; 


34:12;126:19;150:21 


163:17;165:13,17 


79:15 


116:10;138:6;141:6;142:9; 


discussions (1) 


DoD (6) 


dump (3) 


146:4;154:4 


157:21 


29:13,18;30:1,7;64:13; 


55:5,8,12 


difficult (2) 


disk (13) 


160:17 


during (16) 


55:18;82:16 


16:2,6;39:19;40:8;51:2,9, 


Doe (4) 


6:21;15:2,2;33:6;39:3; 


digital (1) 


12,15,20,21;81:12;86:9; 


110:16,18,18,19 


72:19;97:4;105:10;125:6; 


153:4 


163:18 


domain (1) 


130:15;140:4;146:5;151:7; 


dikes (1) 


disks (1) 


110:9 


154:7;160:12;165:13 


166:12 


12:15 


done (2) 


DUST (1) 


diligence (1) 


display (1) 


105:6;1 17:20 


9:17 


11:19 


35:11 


dot (65) 


duty (5) 


Diplomacy (12) 


displayed (2) 


13:15,15,16;14:9,10,11, 


9:16;111:4;123:8;162:3,3 


76:13,16;77:10;78:10; 


18:4;65:11 


15;17:13;18:2;19:14,17; 




82:5,6,9;86:13;95:12,13; 


displays (1) 


32:7,1 1,19,19;40:5;43:10; 


E 


96:2;129:8 


65:10 


47:9;48:21,21;54:15,18; 






Diplomasy (2) 


disposition (1) 


64:6,13,16;65:1,10;72:14, 


E4 (3) 


95:20;96:10 


60:13 


14,15;73:1,6,13,14;74:4,5,7, 


69:13,14;122:1 


diplomatic (2) 


dispute (3) 


9,11;76:2;85:15;89:10; 


earlier (9) 


79:6;80:10 


135:9,11;152:12 


91:15,16;92:3,10,11, 13,14; 


87:7;92:20;103:6;104:16, 


diplomats (3) 


Disregarding (1) 


93:12,13;104:12;108:19,21; 


21;105:21;106:12;143:14; 


131:6;149:9;158:5 


38:1 


110:15,16,18,18,19;116:6; 


160:13 


direct (4) 


disseminating (1) 


143:17,18,18,18,19 


early (1) 


9:8;53:21;54:7;146:3 


81:20 


double (1) 


82:1 


directed (1) 


distinction (1) 


65:4 


earned (2) 


159:14 


101:2 


doubt (3) 


69:14;122:1 


direction (1) 


distinguished (1) 


136:1;139:4;166:8 


earth (2) 


6:8 


101:4 


doubted (1) 


131:11;149:7 


directly (4) 


distraction (1) 


145:3 


easier (1) 


87:10,12,20;102:21 


133:12 


down (6) 


47:16 


directory (3) 


distribution (1) 


19:11;49:21;50:2;88:7; 


easily (1) 


110:11;112:13;118:13 


81:13 


106:15;115:1 


146:2 


discipline (1) 


division (1) 


download (18) 


easy (1) 


131:14 


155:17 


10:7;50:21;62:7,8,20; 


47:17 


DISCLAIMER (1) 


divulging (1) 


63:7,11, 15;65:19;73:16; 


edge (1) 


2:1 


162:7 


84:2;87:21;103:21;105:7; 


149:21 


disclose (5) 


DOC (1) 


117:8;118:9,11;120:15 


edited (6) 


136:2;146:19;161:11; 


32:9 


downloaded (16) 


34:21 ;41:19;43:10;44:2; 


163:17,21 


doctoring (1) 


12:14;32:4;51:8;63:10; 


153:17;157:3 


disclosed (12) 


38:11 


73:11;83:15;85:7;104:4,9, 


editing (5) 


8:8;28:5;34:11;37:8; 


document (46) 


14,20;105:3;118:17;144:5; 


2;7,14;41:4;42:16;43:18 


117:6;139:11;144:6; 


4:14;18:2;25:10;26:18; 


145:9;162:17 


edition (1) 


145:10,18;149:1;153:18; 


27:2,13,14,14,19,19;28:6,6, 


downloading (7) 


159:4 


160:15 


17;30:10,18;31:7,18;32:4,4, 


62:12;64:18;65:1;83:14; 


editor @wikileaksorg (1) 


disclosing (7) 


7,8,9;33:11,13,14,15;34:15, 


87:8;102:11;116:1 


109:1 


17:19;20:13;109:3;139:1; 


19;40:6;55:19;61:19,20; 


downloads (1) 


editorial (2) 


141:19;146:7,12 


65:16;74:8;96:7;126:21; 


63:17 


30:3;143:5 


disclosure (9) 


142:15, 15,18;143:10,20,21; 


dozens (1) 


edits (2) 


45:3;75:2;113:16;117:21; 


144:9;147:12;151:19; 


121:7 


41:11,13 


138:14;139:16;146:1; 


154:13 


draft (1) 


effect (2) 


147:9;152:6 


documents (72) 


2:12 


94:2;105:21 


disclosures (4) 


4:12;17:13;18:13;21:5; 


draw-down (1) 


effective (1) 


20:21;127:5;135:20; 


22:10,11, 14,16,18;23:1, 10; 


132:9 


50:6 


161:10 


25:4,14;26:13;27:8;31:1; 


drills (1) 


effectively (2) 


discover (1) 


35:16;39:19;45:20;48:14; 


155:15 


48:20;78:5 


137:9 


59:8,10;67:6;69:6;71:2,2,5, 


drive (9) 


effectiveness (1) 


discrediting (1) 


8;72:9;73:14,16;74:5; 


38:17,18;43:15;50:17; 


113:1 


133:21 


/ J. !V,o J. l^f ,oo.o,yz.o, 


oi . i j,o j.zu,oo. i ,iuu.v, 


effects (5) 


discuss (3) 


96:5;104:1,9,14;105:8; 


141:7 


105:20;138:13;149:4; 


301 -71 -1 1-137-12 


106:4,5,6,10,19;107:9,13, 


Drum (3) 


1 50-4-161-10 


discussed (8) 


18,20;108:4,5;114:10; 


10:12;132:10;140:5 


efficient (1) 



Min-U-Script® 



Provided by Freedom of the Press Foundation 



(175) different - efficient 



United States vs. UNOFFICIAL DRAFT - Vol.21 

PFC Bradley E. Manning 7/25/13 Afternoon Session July 25, 2013 



87:3 


14:5;17:21;39:10 


111:10,18;130:21;131:8; 


everyone (2) 


efficiently (1) 


encrypting (1) 


132:17;136:18;149:11; 


19:20;1 12:20 


30:12 


161:19 


165:1 


evidence (35) 


effort (2) 


encryption (2) 


entirely (1) 


12:16,17;15:6;16:12; 


43:12;166:19 


46:7,8 


113:9 


17:7;18:3;37:13;39:4;40:4; 


efforts (2) 


end (9) 


entirety (3) 


45:16;47:6;54:4;67:5,10, 


70:15;162:10 


63:4;69:5;91:7;97:9; 


37:6;65:15;82:3 


11;76:8;91:10;100:7,10,14, 


Ehresman (2) 


114:17;123:11;143:15; 


entities (1) 


16;116:16,21;118:1;121:3; 


96:17,20 


145:13;148:3 


150:8 


129:16;130:2,11;134:11,14; 


either (3) 


endeavor (1) 


entity (1) 


135:18;136:6;141:17; 


79:16;117:10;119:9 


165:1 


110:9 


150:21;166:4 


electronic (2) 


ended (3) 


entries (3) 


evil (3) 


119:21;120:12 


97:8,9;119:12 


111:10;121:20;122:5 


135:17;152:3,8 


elevate (1) 


enemies (22) 


entry (1) 


exact (10) 


52:10 


5:13,13;8:5,19;9:6;18:16, 


121:17 


32:3;52:2;55:15;85:20; 


elevated (1) 


18;28:2;34:18;134:10,12, 


enumerated (1) 


88:3;105:11;114:10; 


99:7 


17;136:19;139:19;154:4; 


33:14 


130:21;146:19;156:8 


elicited (1) 


155:19;160:5;163:6;164:4; 


environment (3) 


exactly (3) 


151:1 


165:16,19,19 


157:18,18;158:1 


52:15;153:13,14 


else (6) 


enemiesal-Qaeda (1) 


equipment (1) 


examiner (1) 


5:5;19:20;67:4;97:18; 


135:13 


29:5 


114:13 


113:15;150:18 


enemy (64) 


equipping (1) 


example (3) 


Elten (1) 


4:21;5:9;6:4,4,6,10,14; 


52:17 


5:2,20;6:19 


3:8 


7:2,4,14,18;8:1;11:7;37:20; 


equity (1) 


examples (1) 


e-mail (21) 


75:8;130:3;131:2;134:1,7, 


72:9 


78:9 


41:8,10,12;43:18;80:16; 


18;135:8,16,18;136:4,9; 


erase (2) 


exceed (1) 


108:19,21;110:13;111:11, 


137:9,16,17;139:5;140:3, 


16:6;47:5 


122:8 


21;114:8;117:2,11;118:8, 


10,12,16;141:11, 12,15; 


erased (3) 


exceeded (1) 


12;120:18;122:7;137:13; 


142: 1,4,10;146: 15,20; 


17:7;20:11;39:3 


25:17 


143:11,17,18 


147:2,10;149:15;152:19; 


erasure (1) 


exceeds (1) 


e-mailing (1) 


154:16;155:8,9,12,16,21; 


47:4 


24:2 


119:9 


156:3,5;158:14,15,18; 


errors (2) 


Excel (6) 


e-mails (13) 


159:20;160:1,4,8;162:6; 


62:15;65:21 


11:12;14:13;88:16,17; 


110:11;111:1;112:10; 


163:15;166:1;167:1 


especially (4) 


89:5;91:16 


115:8;116:1,5,14;117:4; 


enemy's (4) 


8:21;37:18;106:1;109:4 


excels (1) 


118:11;121:5,14;150:14; 


42:9;136:11;137:4; 


essential (1) 


157:19 


165:3 


158:11 


145:13 


except (1) 


embedded (1) 


energies (1) 


essentially (6) 


50:2 


37:13 


113:18 


4:9;14:13;33:4;39:10; 


excerpt (2) 


eminently (1) 


engaged (2) 


83:12;159:15 


73:6;104:8 


130:10 


127:6;140:16 


established (3) 


excerpts (1) 


emphasized (1) 


engagement (1) 


121:2;136:9,12 


154:1 


123:3 


37:10 


establishing (1) 


exchange (5) 


employ (5) 


engagements (1) 


134:16 


110:4;114:6;117:3; 


6:16;9:19;10:15;146:18; 


9:15 


evaluation (2) 


120:17,18 


156:7 


engineer (1) 


25:9;26:17 


exclusive (9) 


employed (1) 


54:2 


Eve (1) 


8:7;22:4,7;68:10,13,14; 


7:5 


engineering (2) 


33:11 


94:20;95:3;124:16 


employees (1) 


82:2;98:16 


even (21) 


excuse (13) 


124:2 


enough (5) 


7:13;11:19;20:19;37:9; 


14:9;17:4;27:15;51:8,12; 


enable (1) 


40:11;81:15;87:3,4; 


42:12;44:8;45:2;55:11; 


55:7;107:11;108:9;115:16; 


78:4 


144:14 


59:19;97:18;101:18;102:6; 


122:12;141:1;157:10,17 


EnCase (2) 


ensure (2) 


107:4;118:11;120:17; 


excuses (1) 


54:13;55:14 


80:10;167:1 


130:20;131:10;149:17; 


36:18 


enclosures (2) 


Ensuring (2) 


152:7;158:2,6 


EXE (4) 


16:19;27:3 


79:19;137:21 


event (5) 


64:13,16,19;65:1 


encoding (1) 


entered (1) 


5:3;6:21;39:12;114:9; 


executable (7) 


90:19 


121:11 


156:21 


64:12,17;85:4,13;89:8; 


encourage (1) 


entering (1) 


events (8) 


99:17;100:15 


1 Al- 1 


191-8 


^•1 1 A-Q 10 10' 


executes y± ) 


encouraging (1) 


entire (16) 


128:10,14;157:16 


155:18 


146:9 


40:12;45:4;50:8;62:7; 


everybody (2) 


executing (1) 


encrypted (3) 


68:19;77:9;97:4;98:18; 


131:11;149:7 


16:5 



Min-U-Script® 



Provided by Freedom of the Press Foundation 



(176) efficiently - executing 



United States vs. 


UNOFFICIAL DRAFT 


- Vol.21 


PFC Bradley E. Manning 


7/25/13 Afternoon Session 


July 25, 2013 


executive (1) 


112:18,21;164:17 


76:7 


88:20;89:7,10;91:15,17; 


67:11 


Explorer (1) 


famous (1) 


92:10,14,14,14,20:93:4,12, 


exercised (1) 


73:9 


20:5 


14;104:12;105:2;115:10, 


84:9 


export (10) 


far (5) 


10;116:6 


exfiltrate (5) 


11:4,5,8,9,11, 15;82:20; 


24:1;25:17;38:9;66:15; 


files (34) 


20:17;113:21;114:2,5; 


83:1;116:8;118:10 


130:20 


14:5,12;46:10;48:11; 


115:6 


exported (1) 


Farah (7) 


50:1,3,12;52:5;64:13,16,17; 


exfiltrating (2) 


68:20 


103:3,10,15,20;104:3,5; 


73:3,8;85:17,18;86:6;89:7; 


116:1;161:4 


exporting (2) 


108:4 


92:10;93:13;99:17;100:6,8; 


exfiltration (1) 


11:1;59:17 


Fast (3) 


101:3,5,6;104:5,20;105:3; 


84:11 


exposed (3) 


57:4;87:3;113:16 


109:13;116:10,12,14;117:1, 


Exhibit (111) 


119:15,19;120:10 


faster (2) 


2 


4:14;13:3;15:14,17,18; 


exposes (1) 


64:3;85:2 


final (1) 


16:3,4,15,16,18,19;19:8,14; 


35:14 


fear (3) 


124:20 


23:18;27:11,20,21;29:12; 


exposure (3) 


58:16;145:17;146:2 


finally (9) 


30:16;31:15,20;32:1, 13,21; 


10:18;38:4,5 


feat (1) 


19:11;20:5;44:1;49:20; 


40:5;41:7;43:3;45:7;46:17, 


extensive (2) 


11:14 


89:4;99:16;108:3;132:13; 


18;47:20;51:14,15,18; 


10:11;140:3 


feature (1) 


137:21 


53:16;54:7,12;55:20;62:9, 


extent (2) 


11:5 


financial (2) 


16,17,19;63:5,15,19;64:2; 


61:2;78:12 


features (1) 


116:18;150:7 


65:7;66:18,20;67:8,10; 


external (2) 


53:2 


find (6) 


70:8;71:15;72:2,5,7,11,18, 


141:7;146:1 


February (13) 


57:2,7,9,1 1;149:11;166:7 


20,21;73:10,18;74:8,13,18; 


extract (9) 


15:7,9;16:1;32:10;35:6; 


finding (1) 


75:12,13,17;79:12;84:15, 


54:11, 18;62:18;65:17; 


39:17,18;60:5;81:18;82:1; 


52:10 


19;85:7;86:5;87:13;89:21; 


109:9,11;114:15;115:6; 


93:7;144:5;145:9 


finish (2) 


90:3,11;91:13,19;92:2,9,13; 


123:18 


feed (1) 


124:20; 125:20 


95:7;96:13;104:7,11, 17,19; 


extracted (6) 


2:6 


finished (1) 


105:13;113:20;114:11,18; 


21:6;65:8;67:14;94:3; 


feet (1) 


24:14 


115:2,13;122:18;123:14; 


109: 12; 124:7 


101:18 


Finkel (1) 


134:21;135:2;137:6;139:6, 


extracts (4) 


FEIN (32) 


37:11 


8,13;141:4;142:15;145:7; 


89:10;98:19;111:14,20 


3:4;4:5,6;15:18;23:15; 


firewall (3) 


153:12,21;154:7,13,19; 


extremely (1) 


24:18;27:7;33:3;42:5;43:6; 


90:2,5,12 


155:3 


8:14 


45:12,15;46:15;51:19; 


First (36) 


Exhibits (8) 


extremist (1) 


58:20;59:6,7;61:9;62:5,17; 


6:18;7:11;10: 15,20;11:9, 


75:6;78:6,14;111:7,8,9, 


143:14 


71:19;72:21;92:6;93:1,3; 


16;20:8;33:7;38:14;42:20; 


13;116:13 


eyes (1) 


108:15;114:21;125:2; 


49:9;57:20;62:2;63:14; 


exist (1) 


133:14 


126:4,12;128:8;167:7 


64:7;73:11,12;88:11;91:20; 


89:13 




fell (1) 


97:5,7,8;110:15;111:21; 




existence (1) 


F 


132:1 


114:16;125:14;126:18; 


146:21 




fellow (4) 


136:16;142:12,13;144:3; 




expected (4) 


Facebook (1) 


81:10;113:10;162:6; 


145:6;148:3,7;152:21; 


31:16;75:3;131:17;135:6 


44:3 


166:11 


153:5 


experience (9) 


faces (1) 


felt (2) 


five (4) 


10:11;18:8,11;30:21; 


155:19 


69:5;132:21 


20:19;101:18;143:20; 


42:8;44:9;84:7; 140:3; 


facilitate (2) 


few (2) 


160:13 


162:20 


36:1;118:5 


33:4;111:8 


flag (4) 


experiences (1) 


fact (13) 


field (3) 


151:5,8,9,10 


35:17 


8:21;12:17;47:18;87:6; 


5:16;22:12;115:2 


Florinda (1) 


expert (3) 


134:21;135:3;139:10; 


fight (3) 


97:11 


99:18;106:18;140:14 


148:14;153:1,12,20;154:6; 


18:18;113:9;155:12 


flow (1) 


explained (13) 


163:4 


fighting (1) 


13:2 


7:2;28:13,17;36:11;52:4, 


facts (5) 


163:21 


flying (1) 


12;63:11;65:6;75:7;104:16; 


47:6;127:21;134:16; 


figure (7) 


35:10 


106:11;111:20;135:6 


135:9;150:20 


7:6;57:7;58:12;85:1; 


FOB (4) 


explaining (1) 


factual (1) 


88:20;1 15:5,20 


10:12,17;45:18;101:11 


18:6 


156:5 


file (63) 


focus (4) 


explains (3) 


fail (1) 


14:6,9,15,16;17:21;19:14, 


9:16;77:2;81:5,7 


31:18;153:13,21 


49:4 


17;40:7,7;49:18,19,19,19; 


focused (4) 


explanation (1) 


failed (1) 


50:1,1,16,16;51:5;53:20; 


133:8;137:17,21;166:6 


17:6 


Oj.j 




focusing (1) 


explicitly (2) 


failure (1) 


56:3;57:14;58:5,7;64:19; 


163:20 


127-1 -142-10 


63:13 


65:7,9;72:13,18;73:2,2,6,7, 


fop (1\ 


exploitation (3) 


fallout (1) 


17;74:4,8;85:4,13;86:1,4; 


18:17;141:2 



Min-U-Script® 



Provided by Freedom of the Press Foundation 



(177) executive - fog 



United States vs. 


UNOFFICIAL DRAFT 


- Vol.21 


PFC Bradley E. Manning 


7/25/13 Afternoon Session 


July 25, 2013 


FOI (1) 


forward (1) 


22:14;31:18;98:15;107:1; 


108:7;109:12,15,17; 


149:5 


17:4 


141:13;142:5;159:10 


110:4;111:19;114:1,4,16, 


FOIA (3) 


found (16) 


Furthermore (5) 


21;116:10;117:19;118:5, 


39:13;44:11,14 


7:7;13:17;15:1;25:5; 


8:18;21:16;60:21;67:21; 


12;119:11;120:16,19;121:1, 


folder (17) 


26:14;40:8;59:14;60:9; 


94:11 


9,13,16,20:147:14,16 


13:15,20;14:2,4;52:3; 


89:10;113:14;114:13; 


future (2) 


globe (1) 


73:14,20;74:1,2,6;85:14; 


117:3,6;131:7;152:10; 


94:3;140:12 


81:3 


92:4,7;103:15,20;104:3,5 


154:12 




gmail (2) 




followed (2) 


foundation (2) 


G 


116:18:119:10 


33:15;117:6 


133:4,15 




goal (1) 




followers (1) 


founded (1) 


Gadahn (8) 


84:16 


159:14 


143:14 


134:16;135:3;153:17,20; 


goes (4) 


following (3) 


four (5) 


154:5,21;155:5;157:7 


27:14;29:21;76:14;121:9 


29:4;54:21;127:21 


7:3;13:12;65:19;103:18; 


gain (6) 


good (5) 


footage (3) 


160:13 


42:11;49:3;52:14;58:3,5; 


58:17;125:3;131:14; 


35:2,21;39:18 


fourth (1) 


81:13 


140:8;143:14 


force (2) 


127:13 


GAL (17) 


Google (3) 


29:10;142:18 


fox (2) 


110:6,13;112:17;113:3; 


85:4;114:13;115:3 


forces (12) 


81:5;136:18 


114:5,15:122:6,8,10,15,15; 


Government (37) 


7:2,14;9:9;10:3;29:17; 


FPT (1) 


123:5,8,11;124:7,9,13 


2:3;3:3;20:18;23:19; 


80:20;114:6;118:4;132:8; 


49:3 


games (8) 


29:7;31:8;34:1;37:5;52:18; 


156:4,13;157:1 


free (4) 


99:13;100:5,8,11,15,17, 


75:16;80:11;96:16;98:13; 


foreign (47) 


17:9;42:1;50:21;139:19 


19;101:7 


108:4;110:7;1 17:7,9; 


22:2;24:4,8;25:3,6,12,19; 


friends (1) 


GAP (7) 


118:17;119:8;120:9; 


26:1,12,15,20;29:14,15; 


15:8 


84:12;109:9,1 1;120:6,8; 


123:19;124:2,17;125:16,16; 


30:7;68:8;70:5,11,14;75:1, 


front (1) 


161:17:163:19 


126:2;129:6;146:10;148:9; 


5;76:10,18;78:1,5;79:5,6; 


133:14 


gaps (1) 


150:2;153:2;154:8;160:7; 


94:18;95:10,14;96:11; 


fruit (1) 


61:1 


163:7,10,11;165:17 


119:19;122:13,20;123:4; 


20:17 


garner (2) 


governments (1) 


124:14;128:21;129:7; 


fruition (1) 


40:13;60:4 


139:14 


131:8;139:14;143:1,7; 


132:15 


garnered (1) 


government's (2) 


149:12;150:7;157:16,17,21; 


fruits (1) 


144:10 


36:14;125:20 


160:17 


132:14 


Garrison (2) 


grab (1) 


forensic (4) 


frustrated (1) 


1:9;136:8 


88:6 


16:16;40:4;54:13;114:13 


132:2 


gather (5) 


grade (3) 


forensically (4) 


Ft (2) 


8:10;130:3;135:14;147:2; 


69:13;70:2;121:21 


15:12;16:7;118:2;165:4 


132:10;140:5 


153:6 


granted (2) 


forensics (1) 


FTP (13) 


gathered (1) 


118:7;125:15 


55:15 


48:7,8,20;53:4,9,12;54:2, 


5:10 


graphical (2) 


forever (1) 


19,20;55:3;56:8;57:9;58:9 


gave (5) 


65:2;89:19 


20:16 


fuck (1) 


6:18;99:21;102:16;152:9; 


graphics (1) 


form (3) 


164:13 


165:16 


108:1 


43:13;90:20;141:15 


fucked (1) 


general (4) 


grieved (1) 


formal (1) 


164:8 


135:17;148:3;152:3,8 


132:2 


103:12 


fuel (1) 


generalities (1) 


group (1) 


format (5) 


90:21 


80:12 


149:5 


90:18;131:9;149:12,14; 


full (2) 


generally (3) 


groups (4) 


158:19 


97:8;111:3 


9:14;30:20;71:11 


29:15;96:3;137:8;143:2 


formation (1) 


Fulton (4) 


geographic (1) 


GTMO (13) 


133:3 


6:11,13;38:16;43:14 


95:16 


59:8,9,13;60:9;61:10,15, 


formatted (1) 


function (9) 


gets (1) 


16;66:14;69:2,6;70:15; 


117:4 


11:12;82:21;87:8;89:1; 


47:1 


84:7;129:2 


former (2) 


115:7;116:7;118:10,10; 


Gharani (6) 


guarded (1) 


106:17;107:1 


159:15 


39:4,8;40:15;103:8,10; 


78:4 


forms (1) 


functionality (2) 


106:1 


GUI (1) 


111:15 


84:3;89:13 


given (4) 


65:3 


Fort (3) 


functions (1) 


8:21;30:21;110:9;150:15 


guide (2) 


1:11,17;10:12 


99:9 


giving (6) 


56:12,13 


forth (5) 


funding (2) 


130:20;134:1;135:15,16; 


guilty (1) 


25:2;26:11;70:20;95:20; 


oU.j,j 


1/10-1-1/17-10 
14Z. 1,14/. 1Z 


166:8 


123:11 


funeral-like (1) 


glad (1) 


gullable (1) 


Frtrtiinatplv 


132:1 


43:19 


166:13 


49:2 


Further (7) 


Global (24) 


Gwynn (2) 



Min-U-Script® 



Provided by Freedom of the Press Foundation 



(178) FOI - Gwynn 



United States vs. 


UNOFFICIAL DRAFT 


- Vol.21 


PFC Bradley E. Manning 


7/25/13 Afternoon Session 


July 25, 2013 


28:7;31:6 


55:1,1 


historic (1) 


148:15;149:8,16;150:1,5,9; 




hashing (1) 


18:6 


151:2,16;152:4,12,21; 




H 


46:10 


historical (3) 


153:1, 12,15;154:3,11; 




head (1) 


8:12;18:12;135:7 


155:6,10;156:8,15,19; 




ha (1) 


61:14 


history (2) 


157:11, 18;158:10,20; 


47:21 


Headquarters (3) 


47:11;73:2 


159:18;160:21;161:13; 


habit (1) 


1:8,8;77:18 


hit (4) 


162:1,9;163:8,13,20;164:7, 


102:5 


hear (1) 


5:3;132:19,19;133:20 


11,15;165:1,18;166:3,10, 


habitual (1) 


98:8 


hits (3) 


14,16,19;167:3,6,7 


142:6 


heard (25) 


96;4,4;143:14 


Honorable (1) 


hacker (2) 


9:13;13:16;14:12;31:6; 


holder (1) 


1:17 


166:11,11 


35:8;45:10,15;48:7;52:8; 


72:9 


hooked (1) 


hackers (1) 


98:6;103:6;110:20;117:3; 


holding (1) 


12:11 


139:15 


123:21;129:16;130:1; 


19:15 


horrifying (2) 


hailed (1) 


134:10;140:11;151:6,16; 


Holifeld (2) 


147:16,17 


40:20 


155:10;156:12,19;157:15; 


12:5;13:8 


Hoskins (2) 


haired (1) 


160:13 


Honor (318) 


22:21;107:11 


161:19 


Hearing (2) 


4:6,9;5:5,12,14;7:18; 


host (1) 


Hall (6) 


1:15;56:2 


8:18;9:7,13;10:5;12:13; 


47:6 


1:10;5:15,17;106:17; 


heart (5) 


13:3;14:18;15:6;16:8,15; 


hostile (1) 


140:14;158:13 


47:1;131:6;148:11,20; 


17:7;18:4,14;19:7,9;20:1,7, 


158:1 


Hammer (4) 


149:10 


19;21:2;22:9;23:13,15,21; 


hour (4) 


10:12,17;45:18;101:11 


heedless (1) 


24:14,19;25:3,13,15;27:1, 


70:3;122:2,4;130:17 


hand (4) 


130:9 


10,13,15,16,18;28:1,18; 


hourly (1) 


53:11;70:8;95:7;122:18 


held (7) 


29:9,21;30:15,17;31:15; 


69:17 


handed (1) 


7:10;22:17;36:18;48:17; 


32:1,12;33:3,7,12;34:7,9, 


hours (16) 


23:17 


145:17;148:1;163:2 


19;35:8;36:10,15;39:1,7; 


16:6,9;39:17;51:10;57:8; 


handle (2) 


helicopter (5) 


40:3,10;41:3,7,9,16;42:5, 


65:19;69:10,16,20,20;70:2; 


56:13;106:19 


35:3,9,12;42:17,21 


10,13,20;43:6;44:15;45:1,9, 


90:8;104:4;121:15;122:4; 


handling (1) 


helicopters (1) 


13,15;46:16;47: 12,20; 


161:1 


44:16 


35:11 


48:19;49:16;50:4;51:7,14; 


house (8) 


hands (7) 


help (6) 


52:1,8;53:15;54:3,6,7,10, 


15:1;17:18;19:15;21:14, 


9:5,6;112:11;136:4; 


6:5;7:8;8:4;65:7,9;88:20 


20;55:2,7,16,19,21;56:10, 


15;67:19;94:9;124:13 


139:5;154:4;167:1 


helped (1) 


15;58:17;59:7,9,11;60:11, 


housed (1) 


handy (1) 


6:16 


21;61:13;62:1,6,17,19;63:1, 


61:11 


165:3 


helpful (5) 


19;64:10,16;65:6,18;66:7, 


http (1) 


happen (1) 


152:19;155:8,9;159:9; 


20;67:19,21;68:15;69:5,11, 


143:17 


157:9 


160:5 


17;70:4,6,10;71:1,7,19; 


human (2) 


happened (2) 


helping (2) 


72:3;73:1;74:3,15;75:3; 


79:1;166:5 


5:6;6:21 


77:11;103:7 


76:12,19;78:6,14;79:18; 


humanist (2) 


hard (5) 


herring (1) 


81:9;82:4;83:4;84:8,15; 


147:20; 166: 10 


50:17;85:20,21;141:7; 


36:20 


85:6,12;86:5,8,12;87:1,13; 


hundreds (1) 


162:5 


hex (4) 


88:2;89:12,21;90:19;91:13, 


11:1 


harder (1) 


54:15;55:5,8,12 


18,21;92:1,6,13,17;93:1,3, 


HUNTER (1) 


163:10 


hide (3) 


13,17;95:5,9;96:9,12,14; 


3:7 


harm (9) 


58:15;102:6;123:18 


97:7,9,21 ;98:2,4,8,20; 


HURLEY (7) 


5:13;23:2,12;75:4,4; 


hiding (1) 


99:18;100:7;101:13;102:4, 


3:13;23:16;27:12;70:7; 


79:14,14;107:14;166:18 


47:7 


9;103:2,6,18;104:7,11,16; 


71:4;72:1;95:6 


harvest (6) 


high (1) 


105:10,19;106:10,17;107:4, 


hyper-masculine (1) 


65:14;77:12;81:12;87:4; 


132:6 


19;108:3,7,9,10,15,16; 


166:12 


90:14;93:18 


highest (1) 


109:2,10,19;110:15;111:3, 


hypocrisy (1) 


harvested (6) 


156:10 
highlight (3) 


8,13,17;112:2,5,11,17; 


41:17 


89:18;91:3,9,10,20; 


113:21;114:8,12,21;115:4, 




165:12 


46:2;66:15;69:6 


14;116:12;117:14;118:14; 


I 


harvesting (2) 


highlights (1) 


120:7,15;121:4;122:10,12, 






66:4;90:9 


20:21 


16,20;123:13,16,21;124:19; 


IA(1) 


Harward (1) 


Hillary (3) 


125:2;126:4,9,12;127:14; 


120:12 


107:16 


131:5;149:8;158:4 


128:8,15;129:1,16;130:19; 


Iceland (3) 


hash (16) 


himself (13) 


131:12;133:11,17,20;134:1, 


77:2;8 1:2,2 


49:12,12,13;53:8,10,19; 




Q 0C\- 1 'XK-A- 1 1A- 1 A- 1 on- 1 • 

z,y,zu,i j j .4,1 jo. 10,1 j i . i , 


icon (1) 


55:6,11;56:1,3,12,13;57:2, 


34:17;36:9;41:10;42:12; 


138:5;139:4,9,10,20;141:5; 


65:4 


4 1 3-58-8 

ij 1 -J ,JO.O 


52:17;113:19;154:16; 


142:5,12;144:2,14,21; 


ID (3) 


hashed (2) 


156:16;158:2 


145:5,12,20;147:5,9,18; 


61:19,20;65:16 



Min-U-Script® 



Provided by Freedom of the Press Foundation 



(179) ha - ID 



United States vs. UNOFFICIAL DRAFT - Vol.21 

PFC Bradley E. Manning 7/25/13 Afternoon Session July 25, 2013 



identification (1) 


133:18,20,21;134:16; 


28:3;29:7,14,16,19;30:1,3, 


Inspire (3) 


137:19 


147:13;157:14;161:7 


8,12,19;31:1,2,13,19;34:4, 


158:20;159:1,3 


identified (2) 


incarceration (1) 


6;35:21;36:4,8,11;37:8,21; 


install (3) 


6:15;78:21 


79:2 


41:17;42:1;44:6;47:4; 


15:14;51:8;102:17 


identifier (2) 


incident (7) 


48:17;50:9;53:6,14;55:6; 


installation (1) 


65:17;77:20 


36:16;37:2;39:13;103:14; 


56:9;57:10,18;58:1;59:14, 


51:3 


identifiers (1) 


151:14,21;152:1 


21;60:4,8,16,19;64:3;66:6, 


installed (5) 


88:12 


include (4) 


9,16;67:3,13;68:1,6,9,14; 


51:2;52:13;65:4;99:10; 


identify (2) 


10:1;93:8;100:8;139:16 


70:12,15;71:13,21;74:17, 


102:14 


18:1 1;28:15 


included (9) 


21;75:7,9,21;76:1,6,9;78:3, 


Instead (9) 


identity (2) 


4:14;21:1;60:13;111:5; 


3,19;79:5,13,19;80:4,6,11; 


8:13;41:21;42:7;49:9; 


53:5;137:7 


126:21;144:15;149:15; 


81:2,20;82:15;83:2,7; 


77:11;81:9;120:7;130:21; 


ideology (1) 


163:5;164:3 


84:13;90:17,20;91:4;94:12, 


145:2 


157:19 


includes (6) 


17,19;95:4,11,15;107:3,13; 


instructing (2) 


idiots (1) 


52:10;64:13;85:19;110:3; 


109:4,16,21;1 10:2,3,7,12; 


41:11,15 


166:13 


137:19;145:18 


111:5,18;112:8,19;113:13; 


instruction (1) 


IED (3) 


including (11) 


114:4,15;115:6;117:8,12, 


136:19 


5:3,7;156:4 


34:17;76:18;98:6;106:9; 


13,14,20;118:15,18,18; 


integral (1) 


IEDs (3) 


111:4;119:17;137:8; 


119:2,6,8,11, 16,19;120:21; 


129:6 


10:19;155:20;156:7 


139:13;141:9,13;165:20 


121:2,9,12;122:7,15,21; 


Intel (6) 


IED's (1) 


inclusion (1) 


123:1,4,19,20;124:5,16; 


32:5;43:2;48:4;53:14; 


156:11 


41:11 


129:11, 19;133:4;134:4,8; 


112:14;128:1 


ignorant (2) 


increase (4) 


136:5,14,21;137:3,4,18,20; 


Intelink (13) 


141:8;166:13 


63:20;94:2;123:6;156:15 


138:1, 14;139:2,4,11, 17; 


32:2;43:6;59:14;62:6,18; 


ignored (2) 


increased (2) 


140:19;141:9,10,14,17,20, 


63:3;72:8;105:13,15;144:4; 


18:7;154:16 


30:11;79:20 


21;142:1,7;143:2,4,8; 


145:8;160:12;161:9 


ignoring (1) 


incredible (1) 


144:15;145:1, 15,18,19; 


intellectual (1) 


33:13 


150:17 


146:2,10,11, 19;147:2,13, 


142:9 


image (2) 


increments (2) 


14;149:18,20;150:2,7,8,16; 


intelligence (94) 


51:5,5 


11:6,10 


152:5,6,7,13,19;154:4,9; 


5:10,17;6:1;7:20;8:10; 


images (2) 


independent (1) 


155:1,5,7,11, 15;156:6,17; 


11:5;19:4;22:3;24:4,8;25:3, 


37:7;45:5 


121:2 


158:12,18;159:9,16,19,20; 


6,12,19;26:1,12,15,20;28:9; 


immediate (1) 


in-depth (1) 


160:2,3,3,7,18;161:4;162:4, 


29:15;30:13;34:11;44:21; 


43:12 


155:4 


5,18,21;163:7,10,12,13,18; 


60:7,14,17,20;61:1;67:12; 


immediately (1) 


index (4) 


164:2,9;165:10,20;166:21 


68:9;69:10;70:5,11,14; 


162:15 


72:14;73:1,6;104:12 


informations (1) 


71:9;74:21;76:19;79:5,19; 


impact (4) 


indicated (1) 


146:21 


80:2;81:11;94:19;95:10,14; 


38:12;41:20;42:16;43:20 


67:6 


informed (2) 


96:11;106:17,18;112:12; 


impacted (1) 


indicators (1) 


147:8;149:3 


119:20; 122: 13,20; 123:4,6, 


133:3 


154:17 


informing (1) 


10;124:15;126:18;129:4,12, 


impetus (1) 


indiscriminately (1) 


36:13 


12,13;130:4,7;134:2; 


118:2 


165:12 


informs (1) 


135:14,15,16;136:7,8,10, 


imply (1) 


individual (6) 


101:14 


17;138:20;141:14;143:1, 


12:13 


84:4;102:8,11;131:3; 


INFOSEC (3) 


10;144:12;146:17;147:3; 


importance (3) 


146:3;155:16 


29:11;137:5;142:19 


148:3,7,9,13,16;149:16; 


21:5;44:6;79:20 


individuals (6) 


info-wise (1) 


152:10,15,15,18;154:15; 


important (5) 


19:4;38:19;112:8;119:2; 


164:13 


155:6;159:21;161:6;163:3; 


4:17;55:9;63:1;92:19; 


123:1;145:15 


inherent (1) 


165:8,9 


156:21 


individuals' (1) 


21:4 


Intellipedia (2) 


importantly (1) 


111:3 


inhibit (1) 


61:17,21 


46:16 


individual's (1) 


82:15 


intend (1) 


impossible (1) 


112:1 


injure (1) 


71:20 


82:16 


inevitably (1) 


76:10 


intended (5) 


inaccessible (1) 


147:10 


inquires (1) 


21:19;68:3;94:14;110:1; 


12:3 


inference (1) 


56:1 


118:16 


inaudible (35) 


141:19 


inscom (1) 


intent (5) 


2:17;8:11;9:11,16;10:3; 


inflict (1) 


143:18 


20:15;134:5;135:17; 


20:1;23:8;27:16;31:8,12; 


155:12 


insider (3) 


152:3,8 


33:16;35:11;40:3;42:19; 


information (248) 


131:18;146:1,1 


interest (3) 


£ + £ t.ZU,Zl,J i t. 1 W, Jy . 1 J, 


o.T o 1Q-Q-1 A 7-19-Q- 

o. / ,o, / ,iz.y, 


insigni yi) 


717.7.77.1 .i/ic.Tn 


63:20;64:11;67:15;100:5; 


18:9,15,21;19:18;20:5,8,11; 


8:1 


interested (1) 


103:15;112:10;114:3; 


21:17;22:1,3,8,12;23:1,4,6, 


insights (1) 


148:12 


118:11;120:21;130:8; 


17;24:5,9;25:4,20;26:2,13; 


5:19 


Interesting (3) 



Min-U-Script® 



Provided by Freedom of the Press Foundation 



(180) identification - Interesting 



United States vs. 


UNOFFICIAL DRAFT 


- Vol.21 


PFC Bradley E. Manning 


7/25/13 Afternoon Session 


July 25, 2013 


74:1,2;144:14 


140:7,20;155:17,20;162:16; 


127:20;128:17;134:15,15 


known (4) 


interests (1) 


165:14 


Julian (23) 


9:17;57:2,3,4 


148:11 


Iraqi (3) 


33:21;47:19;49:5;53:19, 


knows (1) 


interface (5) 


19:19;80:19;132:8 


21;54:17;55:11;56:7,11; 


155:16 


65:3;82:7;89:20;102:12; 


IRQ (2) 


57:9;58:11;59:17;66:5,7; 






110:10 


14:10,15 


69:2;116:19;127:4,6,13; 


L 


interfered (2) 


IRR (3) 


145:1;148:5;162:2;163:2 






68:17;95:2 


126:21;144:7,14 


Juliet (2) 


labor (1) 


internal (1) 


ISO (7) 


16:15,16 


20:17 


131:17 


5 1:3,3,4,9, 12,21 ;52:2 


July (3) 


labors (1) 


internet (40) 


isolated (2) 


1:16;128:5,8 


132:14 


30:19;31:10;46:3;47:9, 


158:9;165:21 


jumped (3) 


Laden (10) 


10;51:1;73:2,8;90:21; 


issue (3) 


109:3;138:8;157:12 


9:1;135:1;137:8;139:11; 


116:20;119:13,14;120:10; 


121:4;159:4,5 


junior (1) 


153:2,13;154:5,7;158:6; 


126:9,17;127:17,19;129:14; 


items (3) 


158:13 


165:20 


130:3,8;137:4,5,13,15,16, 


18:6;43:1;153:4 


justifications (1) 


Lama (1) 


18;138:1,4;139:16,17; 




150:19 


81:14 




141:13;142:5;145:12,14; 


J 




Lamo (22) 




147:1;149:1;158:21;159:5; 




K 


14:3;20:20;21:2;59:20; 




160:4,16 


JA(1) 




66:13;84:14,16;116:18; 




interrupting (1) 


54:8 


keep (4) 


120:1;131:5;147:18;149:3; 


42:4 


January (24) 


58:18;113:12;125:2; 


151:1,3;158:3;160:21; 


in-theater (1) 


11:17;13:1,6,10,10,13,13, 


136:21 


161:13;162:8,13;164:11,15; 


147:7 


21;14:16,17;15:13;16:1,8; 


keeping (1) 


166:14 


intimately (1) 


17:4,5,9,15;18:15;39:1,2,7; 


165:3 


laptop (3) 


161:14 


47:4;145:9;159:3 


kept (4) 


21:14;67:20;124:13 


into (11) 


JDIMS-I (1) 


20:11;141:6,9;145:1 


large (4) 


5:19;18:3;39:21;49:17; 


61:15 


key (7) 


20:8;130:21;145:21; 


84:4;88:16,19;89:6;90:17; 


Jihad (1) 


9:14;29:8;35:15;54:3; 


159:9 


91:11;103:12 


159:7 


82:19;96:3,8 


largely (1) 


introduce (3) 


Jihadist (1) 


keyboard (3) 


144:13 


96:15,18;98:12 


159:6 


48:12,16,18 


LaRue (3) 


introduced (4) 


Jihadists (1) 


keys (1) 


35:9,20;36:11 


64:8;85:11;97:15;100:12 


157:7 


48:21 


laser (1) 


introducing (3) 


job (2) 


Kits (2) 


35:14 


89:17;99:1,6 


133:6,15 


97:13;99:18 


last (9) 


introduction (4) 


John (4) 


KN(1) 


4:4;13:9;14:15;49:20; 


100:18,18,19;101:2 


35:9;90:15;110:15,18 


56:1 


59:5;122:16;125:10; 


intrusion (1) 


Johnson (6) 


knew (52) 


131:17;157:11 


120:12 


16:10;66:3;74:7,11; 


14:18;19:3,3;22:9;23:6; 


Lastly (1) 


invaluable (1) 


116:21;117:3 


30:6;31:3;37:20;42:17; 


131:12 


7:17 


join (2) 


44:5,10;57:15;84:1,6;87:1, 


late (4) 


invasion (1) 


47:6;77:1 


2;96:15;97:19;101:14; 


10:21;18:15;82:1;103:7 


119:21 


Joint (1) 


106:3;120:12;126:7,15; 


later (13) 


inventory (1) 


1:10 


127:16;129:17,21;130:2,20; 


13:13,17;14:17;20:15,19; 


4:10 


JOSEPH (1) 


136:4,13,13;138:5;139:3; 


39:17;41:5;43:16;44:18; 


investigation (6) 


3:5 


141:19,20;146:8,13,19,21; 


63:9;74:4;76:6; 126:20 


44:13;103:3,12,14;104:1; 


JOSHUA (1) 


147:13;148:1;149:6,15; 


laughing (1) 


108:5 


3:12 


150:3;157:9;158:17;160:1, 


34:3 


investigative (1) 


journalist (1) 


4,6,15,16;164:3 


Lauren (1) 


104:5 


37:14 


knowing (8) 


162:2 


involved (3) 


JRTC (1) 


8:9;19:10;28:5;50:11; 


layer (2) 


5:7;24:12;26:4 


147:7 


112:7;134:7;163:5;164:1 


49:20;90:19 


involvement (1) 


JTF (3) 


knowingly (4) 


lead (1) 


38:8 


61:10,16;66:13 


71:7;152:8;161:6;165:16 


156:14 


IP (2) 


Judge (14) 


knowledge (19) 


leader (1) 


32:14,18 


1:18;4:2;15:16;23:14; 


28:2;44:9; 100:6; 101: 14; 


9:14 


Iraq (28) 


24:17;27:5;33:2;43:5; 


134:5;135:11,12;136:9; 


leaders (4) 


9:12;10:7,16;11:21;12:1, 


45:11, 14;46:14;51:18; 


138:13,19;139:21;141:18; 


157:17,17,21;165:10 


7;13:9;14:9;25:16;26:5; 


jo.iy,zi 


14Z.4,14 / .V,iZ, 14:7. j, 


leading (3) 


29:5;39:2;98:5;101:11; 


judgments (1) 


163:9;166:5,17 


41:21;141:18;144:9 


110-10 16-1 14-6-1 18-4 1 1 • 


29:8 


knowledgeable (1) 


leak (2) 


119:17;124:2;128:14; 


judicial (4) 


50:20 


39:9;146:2 



Min-U-Script® 



Provided by Freedom of the Press Foundation 



(181) interests - leak 



United States vs. 


UNOFFICIAL DRAFT 


- Vol.21 


PFC Bradley E. Manning 


7/25/13 Afternoon Session 


July 25, 2013 


leaked (1) 


83:17;143:12 


106:10;153:3 


Madaras (1) 


145:15 


limit (1) 


location (4) 


81:4 


leaks (4) 


121:5 


85:20;86:3;1 12:4;137:20 


magazine (6) 


139:16,16;146:9;161:6 


limitation (4) 


locations (2) 


158:20,20:159:1,3,6,8 


learn (5) 


12:4;83:20;91:3;115:21 


61:11;86:7 


main (4) 


40:3;137:1;142:17;144:7; 


limitations (1) 


locking (1) 


5:20;12:2;29:9;98:21 


145:11 


36:14 


102:5 


maintain (1) 


learned (4) 


limited (3) 


locks (2) 


113:15 


36:1;130:21;137:5; 


78:12;82:9;145:19 


49:21;50:2 


maintained (1) 


138:10 


Lind (1) 


log (8) 


12:6 


least (12) 


1:18 


16:2,11;51:15,20;62:18; 


MAJOR (12) 


24:20;25:7;26:8,15; 


line (13) 


63:3;110:19;114:9 


3:4,13;4:5;23:16;27:12; 


52:15;75:10;121:13; 


40:6,6;46:17,17;62:19; 


logging (1) 


59:6;70:7;71:4;72:1;95:6; 


130:12;152:20;164:14; 


65:11;72:7,10;88:19;91:21; 


48:1 


144:11;152:1 


165:19,19 


93:16;110:15;158:3 


log-in (1) 


makes (4) 


leave (3) 


lines (6) 


53:5 


33:18;71:9;112:7;154:14 


15:21;39:3;81:17 


16:4;43:3;51:16,19;89:5; 


logs (17) 


making (1) 


left (14) 


105:14 


9:15;13:1,4,7;15:14;32:2, 


165:2 


15:21;17:17;33:6;39:2; 


link (6) 


21;43:7;48:1,3;62:6;72:8; 


manage (1) 


55:3,7,7,16;56:6;87:17; 


43:2,14;48:4;53:14; 


75:18;90:2;104:8,19; 


82:16 


91:15;92:20;113:6;133:13 


61:20;88:18 


105:14 


manager (1) 


legally (1) 


links (1) 


long (1) 


9:10 


145:17 


80:14 


161:21 


managing (1) 


legend (1) 


Linux (10) 


longer (1) 


162:11 


71:16 


50:19,21:51:8,11,12,21; 


148:19 


Mander (1) 


legitimate (1) 


52:2,6,17;57:19 


longstanding (1) 


14:21 


119:4 


list (28) 


112:9 


manifested (1) 


less (6) 


88:11;108:7,20;109:13, 


look (5) 


152:4 


39:17;45:17;65:19; 


16,17;110:5;111:19;112:9, 


23:17;54:10;55:9;125:13; 


manipulate (1) 


105:20;138:8;148:8 


12,18,20;114:1,5,17,21; 


133:13 


117:8 


lesson (1) 


1 16:11;1 17:20;118:5,13; 


looked (1) 


manner (5) 


137:5 


119:11;120:16,20;121:1,10, 


75:19 


35:19;109:21;118:1,16; 


lessons (7) 


14,17,20 


looking (8) 


164:20 


36:1;137:7,8,12,16,17,21 


listed (2) 


24:14;57:11;59:21;60:3; 


MANNING (332) 


letter (2) 


112:7;118:12 


73:6;111:16;115:3;133:14 


1:6;4:16;6:15;7:12;8:8; 


153:5,8 


listening (1) 


lost (1) 


9:3;10:6,11, 13,17,18,20; 


letters (1) 


2:6 


113:11 


11:9,21;12:14;13:8,11,14; 


49:11 


listing (2) 


low (1) 


14:3,18:15:3,8,10,11,21; 


level (7) 


110:8;111:10 


123:11 


16:5,11;17:7,16;18:1,5,14; 


23:11;31:20;60:14;61:7; 


lists (2) 


lowest (2) 


19:9;20:8,9,16,20;21:6,13, 


107:18;110:8;136:19 


159:6,10 


69:11;70:2 


16,19;22:9;23:6,15;27:6,11; 


levels (1) 


Little (2) 


loyalty (2) 


28:2,5;30:6,18;31:13;32:3, 


80:11 


55:18:67:12 


148:19;165:15 


6,14;33:5,8,10,12,18,21; 


Lewis (25) 


live (2) 


luckily (1) 


34:16,21;35:1;37:19;38:2, 


22:2;23:21;24:3,19;25:1, 


2:6;42:10 


57:10 


10,14,20;39:2,8,12,16; 


5,15,18;26:7,10,14;68:8; 


lives (1) 




40:12,14,17,21;41:3,8,9,18; 




70:10,17,19;94:18;95:9,18; 


8:17 


M 


42:20;43:8,13,17;44:2,5,18; 


96:1,6,10;122:13;123:3,9; 


LM (6) 




45:16;46:2,6,7,12,20;47:2, 




124:14 


49:12,13;53:8,10;56:12, 


ma'am (5) 


13,21;48:6,21;50:5;51:8,21; 


Lewis' (2) 


13 


15:18;24:18;27:7;46:15; 


52:3,15,19;53:1,8,11, 18; 


25:9;26:17 


load (1) 


58:20 


54:1,14;55:10;56:1,7,16,20; 


liable (1) 


86:19 


Mac (6) 


57:6,11, 15;58:9,12;59:13, 


145:17 


loaded (2) 


47:4;5 1:16,20;56:17; 


19;60:7;62:1,12;63:2,9,18, 


Lieutenant (5) 


39:21;86:20 


92:16:163:19 


20;64:2,6,7;65:1, 13,15,18; 


22:20,21;34:1;107:11,12 


local (4) 


machine (6) 


66:4,7,13,14;67:14,19,21; 


light (5) 


10:1;12:14;48:6;58:13 


16:7;47:17;73:5;74:12; 


68:3,16,20;69:5,18;71:4,7; 


125:19;132:17;147:6; 


locally (1) 


110:9;165:4 


72:1;73:11,14;75:19;76:1,6, 


157:1,2 


61:14 


Macintosh (3) 


20;77:3,3,4,7,8,11;81:11,14, 


likely (5) 


locate (1) 


16:17;74:10;76:3 


21;82:2;83:15,20;84:1,9,11, 


17:12;29:18;72:15;112:9; 


Q' 1 Q 

y.Ly 


iviacro \L) 


18,19;85:4,7;86:9,9;87:1,9, 


120:10 


located (10) 


114:17;115:1 


15,17;88:2,9,17;89:1,4,12, 


Lim (7) 


7:4;12:11;17:21;22:14; 


macros (2) 


1 6-90-8 13-91 -3 8 1 9-92-20- 


9:21;80:15,18,21;82:17; 


38:17;93:13;103:16,20; 


109:9;116:3 


93:10,17,17;94:4,9,11,14; 



Min-U-Script® 



Provided by Freedom of the Press Foundation 



(182) leaked - MANNING 



United States vs. UNOFFICIAL DRAFT - Vol.21 

PFC Bradley E. Manning 7/25/13 Afternoon Session July 25, 2013 



95:2;96:15;97:8,15;99:4; 


martial (2) 


members (7) 


million (5) 


101:12,13;102:5,10,13; 


97:20;165:19 


9:19,20;10:17;35:17; 


25:11;26:19;84:2;89:16; 


103:7,19;104:3,4,9,14,19; 


Martin (1) 


120:11;121:8;134:17 


96:11 


105:1, 15,19;106:3;107:2; 


143:12 


memoranda (11) 


mine (3) 


109:2,9,12,20;111:19; 


Maryland (4) 


72:3,15;73:5;74:15,16; 


147:2;158:12;159:16 


113:6,8,14,17,21;114:3; 


1:17;15:2,21;17:18 


75:3,8,9,11,15:76:4 


minimum (3) 


115:20;116:17;117:1,6,16; 


mass (5) 


memorandum (6) 


70:1;146:8,13 


118:17,21;119:6,15;120:1, 


87:8,21;116:7;118:8; 


73:11,12,13,17,20,21 


minimums (2) 


4,7;121:17;122:8,11; 


144:9 


memorialize (1) 


24:2;25:17 


123:16;124:1,7,12;126:5, 


massive (1) 


20:16 


mining (6) 


14;127:1,5,15,18;129:13, 


162:8 


memory (2) 


72:14;140:9,10;141:14; 


13,17,20;130:2,6,14;131:3; 


Master (2) 


85:19;151:17 


158:16;161:15 


134:2;135:12,17;136:4,6; 


151:14,17 


mentioned (5) 


minute (2) 


137:1;138:5,18;139:2,12; 


match (1) 


73:7;87:7;112:1;114:1; 


63:9;130:18 


140:1, 15,18;141:6,18; 


43:15 


150:12 


minutes (8) 


142:13,17;143:9,11,20; 


material (13) 


mentions (1) 


16:6;35:2;56:19;58:19; 


144:3,17;146:4,13,18,21; 


37:1,5;38:2,13;39:20; 


37:14 


59:1;63:18;121:13,15 


147:13;148:1,6,21;150:6, 


44:5;117:7;137:15;138:4; 


mentor (1) 


mIRC (4) 


10,11, 15;151:4,9;152:3,8; 


155:8;156:17;158:7,8 


80:19 


99:19;100:3;101:8;102:1 


153:18;154:10,16;155:1,21; 


materials (1) 


mess (1) 


misconduct (3) 


156:9;157:9,14;158:2,11, 


147:11 


162:8 


131:13;132:5,17 


17;159:13,15;160:1, 10,20; 


mathematical (1) 


message (3) 


missing (3) 


161:3,12;162:7,14;163:9, 


49:13 


77:16,20:91:1 


2:16;9:18,19 


16;164:21;165:7,16;166:10 


matter (2) 


messages (1) 


mission (16) 


Manning's (54) 


1:15;77:2 


114:9 


9:15;28:13;35:18;80:17, 


4:10;12:20;13:5;15:1,15, 


maximize (1) 


met (1) 


18;81:1,10;83:3;91:8; 


20;16:2,16;38:8;44:1,4,15; 


41:19 


125:12 


100:3;102:17;126:19; 


47:7;49:3;51:16;54:17; 


maximum (3) 


method (6) 


132:7;133:8;155:18;163:21 


62:9,20;65:8;66:1;72:14; 


38:4,5,12 


50:6;62:13,15;82:2; 


missions (2) 


74:5;81:7;85:10,15,16; 


may (20) 


84:10;114:9 


19:21;113:1 


86:7;90:4,15;92:8,16; 


2:13;20:20;23:13;43:17; 


methodically (1) 


misspelled (1) 


104:13,17;107:4;108:11; 


71:3;85:11;90:13;92:3,6,10, 


141:9 


2:15 


118:14;120:10;131:13,21; 


15;93:9,11;108:20;109:8, 


methodology (1) 


misuse (1) 


132:5,16,20;133:2,19; 


12;113:6,7;153:2;156:14 


141:12 


109:15 


135:11;136:1,16;142:4; 


McNamara (4) 


methods (5) 


Mitchell (1) 


143:19;145:6;147:6; 


39:21;46:8;151:1;162:2 


37:15;45:6;75:1;79:6; 


151:14 


148:15;149:2;166:7 


MD5 (1) 


146:17 


Moats (5) 


manual (2) 


46:9 


meticulous (1) 


61:13,18:69:8,11,19 


62:9;65:20 


Meade (1) 


28:11 


mock (1) 


manually (1) 


1:17 


metrics (1) 


20:14 


84:2 


mean (2) 


35:15 


modified (1) 


many (11) 


56:5;109:10 


Microsoft (16) 


52:13 


33:2;65:11;69:7;104:13; 


meaning (1) 


32:8;49:7,16;50:8,12; 


moment (4) 


107:1;108:19,20;112:6; 


120:8 


53:2;73:8;85:17;88:17; 


23:13;43:19;92:2;112:1 


138:9;139:19;157:12 


means (3) 


91:16;110:4;114:6;115:16, 


money (2) 


map (4) 


52:13;146:17;152:18 


17,18;118:9 


24:6;150:17 


6:3;17:2;51:13;112:15 


meant (3) 


might (1) 


monitor (1) 


March (45) 


40:17;151:9,10 


47:13 


33:19 


17:1;28:18;32:10,16,17; 


measuring (3) 


migration (1) 


monitoring (1) 


43:1;45:19;46:5,11,15;48:3, 


13:1;45:3;128:1 


72:18 


105:17 


5;51:10;53:17,18;56:10; 


mechanism (3) 


mil (4) 


month (6) 


62:3,6,13,19;64:4,7;65:21; 


58:2,10;88:3 


108:19,21;110:16;143:18 


69:15;97:5,7,8;122:2; 


66:1;72:10,16;73:12,15,21; 


mechanisms (1) 


military (16) 


130:16 


74:10,13;82:1;85:1,3,3,10; 


99:8 


5:2;8:15;24:9,12;26:2,5; 


monthly (1) 


90:6,6,14;91:8;93:9,10; 


media (7) 


103:9,11;105:8;106:1; 


11:10 


97:10;127:21;143:11 


2;5;42:4;144:11;153:4,5, 


128:4;133:5,15;136:16; 


months (8) 


marine (1) 


16;156:20 


137:10;141:6 


11:3;20:19;66:12;103:18; 


8:10 


meet (1) 


Miller (13) 


161:2,3,5,8 


marked (7) 


129:20 


6:14,16;100:2,4;131:16, 


morale (5) 


ZZ. 1 1 , J 1 . 1 1 ,OO.Zl , / ^f . 10, 


nit t iings y± ) 


10, ZU, 1 jZ.^-j 1o,1o,1jj.j, 


iuu. j,i j)z.o,iv, i j j. iv, 


106:5,7;114:18 


78:21 


10,17 


156:14 


markings (4) 


member (3) 


Milliman (4) 


more (32) 


31:3;106:8,9,20 


153:5,6,8 


96:21;97:2,3;98:7 


4:11;8:2;10:8,10;11:19; 



Min-U-Script® 



Provided by Freedom of the Press Foundation 



(183) Manning's - more 



United States vs. 


UNOFFICIAL DRAFT 


- Vol.21 


PFC Bradley E. Manning 


7/25/13 Afternoon Session 


July 25, 2013 


14:19;18:12;30:12,20; 


Murphy (1) 


12,21;129:10 


None (1) 


35:10;37:18;46:16;77:7; 


79:11 


NCD's (1) 


135:9 


81:21;90:5;91:9;94:2; 


music (7) 


84:3 


nor (1) 


104:4;112:8;121:5;123:4; 


99:13;100:4,8,11, 15,17, 


NCIRR (1) 


119:1 


126:5;128:5,11;129:2; 


19 


144:2 


normal (2) 


130:14,17;141:1;148:10; 


must (7) 


NCIS (1) 


58:4;83:14 


160:11;163:10,11 


30:6;78:4;139:17,18; 


144:15 


normally (1) 


Moreover (2) 


143:6,6;155:7 


nearly (1) 


58:14 


37:11;112:11 


Myer (1) 


91:7 


north (2) 


morning (3) 


1:11 


necessarily (3) 


143:17;144:13 


131:7;143:15;149:11 


Myer-Henderson (1) 


6:20;27:2;67:9 


notable (1) 


MORROW (1) 


1:10 


necessary (3) 


60:3 


3:5 


myth (1) 


8:5;80:4;135:18 


note (7) 


MOS (1) 


36:19 


need (7) 


18:5,5;41:9,16;51:14; 


136:18 




10:14;21:11;33:19;37:21; 


56:15;82:4 




most (9) 


N 


80:2;137:2;167:5 


noted (3) 


29:18;41:2;50:6;73:19; 




needed (3) 


104:21;120:4;149:8 




113:8;132:12;140:21; 


naive (5) 


41:17;67:9;113:12 


notes (1) 


158:9;165:21 


42:6;141:8;162:16;164:5, 


need-to-know (2) 


2:14 


mostly (1) 


18 


67:18;94:8 


notice (4) 


27:16 


naivety (1) 


negative (1) 


127:20;128:17;134:15,15 


motivated (1) 


164:21 


157:2 


notified (1) 


42:15 


name (12) 


negatively (1) 


151:14 


motivation (1) 


14:15;40:7,7;41:5;48:8; 


133:2 


noting (1) 


150:13 


58:2;74:1,2,5;112:1,3; 


Nehring (1) 


43:15 


Mountain (5) 


114:19 


22:21 


notoriety (7) 


6:12;7:21;98:5;139:21; 


named (10) 


neighboring (1) 


19:12;38:6;40:18;42:16; 


147:7 


13:15;19:4;48:7;72:13; 


10:3 


43:12;77:7;81:13 


Mountain's (1) 


73:20;74:1,9;91:14;92:14; 


neither (1) 


notwithstanding (1) 


100:3 


103:15 


34:5 


38:12 


mounting (1) 


names (20) 


Neri (2) 


November (7) 


92:11 


2:15;9:18;10:1;14:9; 


107:11,12 


32:20;33:4,10;97:9; 


mouse (1) 


72:18;73:17,17;78:18,21; 


net (3) 


128:15;142:14;145:2 


42:14 


110:17,19;111:1,3,11; 


13:1;95:13;108:18 


number (25) 


move (2) 


112:6,7;116:13;117:1,4; 


Net-Centric (12) 


24:13;26:6;55:17;56:6; 


27:1;113:8 


119:18 


76:13,16;77:9;78:10; 


61:19,20;65:16;70:16,20; 


moved (5) 


nation (4) 


82:5,6,9;86:13;95:11,19; 


77:20;90:1;91:1;92:1,19, 


73:20,21;76:3;92:16; 


76:11;162:19;163:7; 


96:2,10 


21;93:4,11,15,16;95:17,21; 


117:1 


165:15 


Network (6) 


123:2,12;138:7;157:11 


movements (4) 


national (16) 


9:8;52:20;59:15;101:5; 


numbers (1) 


9:16;107:21;108:1; 


22:20;23:2,12;31:5,19; 


119:8;161:18 


49:11 


140:17 


34:12;61:6;74:17;75:4; 


networks (10) 


numerous (1) 


movie (1) 


79:15;107:10,14;144:18; 


11:20;98:2,10,11;161:1, 


132:11 


100:7 


148:11,17,20 


15,17;162:11,12;163:1 




movies (8) 


nationals (1) 


New (3) 


o 


100:4,8,11,15,17,19; 


10:2 


34:3;121:11,13 






101:7,7 


nation's (3) 


newest (1) 


obfuscate (1) 


moving (5) 


138:16;147:1,10 


88:14 


47:16 


73:3;101:4,6;113:16; 


nature (6) 


news (1) 


obfuscating (1) 


163:17 


4:13;28:20;38:13;130:9; 


144:11 


46:3 


MRNs (3) 


141:3;166:5 


next (11) 


objective (1) 


88:12,15,18 


navigate (2) 


4:6;27:13;34:19;39:15; 


28:17 


much (4) 


50:16;86:17 


45:9;59:7,9;63:12;76:12; 


OBL (2) 


42:1;60:4;66:1;91:3 


navigating (1) 


93:15;103:2 


8:21;9:5 


multiple (14) 


58:7 


NIPRNET (8) 


obliged (3) 


24:4;25:19;49:7;51:9; 


NC (1) 


84:20;85:8;109:15; 


21:20;68:4;94:15 


70:11;95:10;106:14; 


13:16 


110:18,19;113:18;118:9; 


observed (1) 


107:19;122:14;134:11,11; 


NCD (34) 


124:3 


81:19 


146:5;165:2,9 


77:9;78:11;79:19;80:5,7, 


Nixon (5) 


obsessed (1) 


Murder (2) 




1 1 1 H-^ 7-1 9fl- 1 A' 


47:2 


41:6;43:10 


17,18,19;83:5,13,14,18; 


121:7 


obsessively (1) 


Murder' (^^ 


87:2,7,10;89:19;90:14; 


non-disclosure (4) 


33-1 5 

JJ.1J 


105:16 


91:20;94:4,6,12,17;102:11, 


107:5;138:10,12,18 


obtain (5) 



Min-U-Script® 



Provided by Freedom of the Press Foundation 



(184) Moreover - obtain 



United States vs. 


UNOFFICIAL DRAFT 


- Vol.21 


PFC Bradley E. Manning 


7/25/13 Afternoon Session 


July 25, 2013 


35:15;43:12;52:5,21; 


140:8,21;141:1,8;149:10; 


order (36) 


61:20;69:18;70:18;71:1; 


86:10 


151:12;161:20;162:9,9; 


2:9;4:2;7:6;11:8;20:14; 


77:12;83:16;84:2;87:4; 


obtained (4) 


163:18;164:19 


23:16;39:4;52:13,21;57:2,6, 


89:8,8,16;90:9,12,21;95:19; 


28:4;53:8,20;57:13 


ones (3) 


9,15;59:3;63:17,19;64:9; 


96:7,11;121:15,15;122:5; 


obtaining (3) 


111:16;127:8;161:15 


65:14;84:9,12,13;88:5,6,8; 


123:10;125:13;132:1,14; 


19:11;49:15;58:8 


online (2) 


89:2;109:11;111:1;113:12; 


136:2;138:9;161:17; 


obvious (3) 


69:4;127:6 


115:5,18,20;125:8;131:14; 


163:17;165:12 


46:21;105:5;158:6 


only (35) 


132:9;133:7;155:6 


Overall (2) 


obviously (1) 


7:16,18;12:10;13:4;17:6; 


ordinary (1) 


35:16;122:10 


157:4 


21:10;31:7;42:2;44:6;52:4; 


62:13 


OVERGAARD (1) 


OCA (5) 


58:5;67:17;80:14;82:5; 


organic (2) 


3:6 


23:9;61:5;79:15;106:20; 


83:2,5,6,18;86:13;94:7; 


84:3;89:1 


over-redundancies (1) 


107:17 


98:11;99:9;102:13,20; 


organization (5) 


111:2 


occasionally (1) 


103:15;106:20;112:2; 


35:5;112:12;123:1; 


oversight (2) 


143:13 


116:5;124:10,10;141:18; 


141:20;153:16 


30:4;143:5 


occasions (2) 


145:21;148:11;164:13,21 


organizational (1) 


overt (2) 


143:21;146:5 


on-the-job (1) 


110:8 


148:14;163:4 


occur (2) 


37:19 


organizations (9) 


overwhelming (3) 


89:2;136:5 


onto (17) 


5:9;8:9;34:14;60:18,20; 


45:16;130:2,12 


occurred (9) 


15:5;39:19;42:6;64:8; 


61:2;138:7,19;157:6 


own (24) 


12:17;15:7,9;16:13; 


74:12;85:7;87:20;91:5; 


organized (1) 


4:10;20:10;41:12;42:11; 


17:14;47:13;56:16,18; 


100:20;102:18,19;104:5; 


114:3 


44:1;45:7;47:3,17;83:21; 


151:20 


110:19;119:10;121:9; 


origin (1) 


109:17;119:9;131:18; 


occurring (2) 


161:17;163:14 


79:3 


136:12,13;139:8;140:18; 


128:10,14 


onward (1) 


original (3) 


142:6;147:8,11;156:6; 


October (1) 


90:14 


27:20;31:17;125:17 


162:9;164:20;166:5,7 


128:11 


ooze (1) 


originator (1) 


owned (1) 


off (9) 


163:14 


78:19 


97:5 


6:15;10:14;16:10;56:16; 


op (2) 


origins (1) 


ownership (2) 


70:2;113:17;117:17; 


98:9;113:4 


56:4 


68:17;95:3 


133:14;134:17 


open (7) 


Osama (10) 






offense (2) 


37:1;42:18;43:8;71:11; 


8:21;134:21;137:8; 


P 


27:16;121:6 


75:18,20;139:19 


139:10;153:1,13;154:5,7; 






Office (6) 


opening (1) 


158:6;165:20 


package (1) 


32:8;111:4;112:3;115:17, 


86:14 


others (5) 


117:11 


18;144:16 


openly (1) 


47:6;79:1;130:10;139:7; 


packaged (1) 


Officer (2) 


97:18 


143:13 


91:11 


35:9;121:19 


operate (3) 


other's (1) 


Packnett (1) 


official (8) 


58:15;65:2;135:8 


133:9 


34:1 


2:3;34:1;72:4;75:16; 


operated (2) 


Otherwise (6) 


page (43) 


77:16;118:5;120:17;160:7 


153:17;160:11 


17:11;75:15;100:11; 


21:2;30:15;32:7;34:8; 


officially (1) 


operating (10) 


106:21;107:8;132:21 


41:8;45:7;47:20;53:15,17; 


37:6 


50:8,15,19:51:1,11,12; 


out (20) 


61:21;63:14;65:7,12;67:1; 


officials (3) 


52:6,18;53:3;58:1 


7:6;8:2;39:20;57:7; 


82:7,7,19;83:5,8,19;84:16; 


78:16;153:3;154:8 


operation (8) 


58:12;69:16;85:1;88:20; 


86:15;87:10,18;88:13; 


often (2) 


12:7;24:11;81:8;103:9, 


108:18;115:5,8,20;116:18; 


103:21;106:11,15;114:14; 


5:18;78:2 


11;105:8;106:1;128:4 


117:16;119:6;144:19; 


145:12,20,20;147:18;148:4, 


OJ(2) 


operational (4) 


145:2;148:2;159:8;163:12 


5;161:13;162:13;163:8,9; 


71:2,13 


26:3;108:1;137:12; 


outcome (1) 


164:11, 15;166:14,15 


older (1) 


162:12 


163:15 


pages (10) 


7:13 


operations (6) 


outlets (1) 


29:12;31:12;66:10,11; 


Once (8) 


9:11;24:12;26:5;28:20; 


144:11 


73:3;106:7,7,13;115:5; 


17:16;19:5;30:20;65:19; 


126:20;137:10 


outlines (1) 


159:5 


83:9;86:20;150:11;164:1 


operator (1) 


2:13 


paid (4) 


one (46) 


15:13 


Outlook (13) 


25:4,10;26:12,18 


4:11;16:8,21;40:20; 


opportunity (4) 


110:10;114:6,17;115:1,6, 


Pakistan (2) 


41:12;43:10;46:1;47:6; 


39:14;77:7,12;109:3 


7,10,10,16,21;116:5,7; 


153:3;158:10 


48:13,16;49:18,18;50:19; 


OPSEC (4) 


118:9 


papers (1) 


52:4,9;58:13;62:20;83:18; 


29:11;139:7,15;142:19 


outside (3) 


66:14 


84:4;97:18;98:4,21;99:19; 


opuon {1) 




Paragraph (6) 


102:2,19,20:111:10,11; 


87:4 


over (37) 


41:12,16;64:19;72:6; 


1 13-4- 121 -16- 124-20- 


options (1) 


5:20;11:7;20:12;35:2; 


1 06-9-1 09-70 


131:7,18;134:14;139:18; 


65:11 


42:18,18;45:20;47:21; 


paragraphs (4) 



Min-U-Script® 



Provided by Freedom of the Press Foundation 



(185) obtained - paragraphs 



United States vs. UNOFFICIAL DRAFT - Vol.21 

PFC Bradley E. Manning 7/25/13 Afternoon Session July 25, 2013 



72:5;74:19;75:13,14 


144:3 


24:9;26:2;60:17;70:15; 


10 


parochial (1) 


penetrate (1) 


81:2;95:15;122:21;142:7 


phishers (1) 


148:9 


120:5 


PFC (380) 


119:20 


part (9) 


penetrated (1) 


1:6;4:10,16;6:15;7:12; 


phishing (3) 


8:15;11:6,16;58:8;75:10; 


120:8 


8:8;9:3;10:6,11, 13,17,18; 


98:16;120:2,3 


99:20;100:3;152:20;165:18 


penetrating (1) 


11:21;12:14,20;13:5,8,11; 


phone (1) 


partial (1) 


161:14 


14:3,18;15:1,3,8,10,11,15, 


112:18 


56:3 


penetration (1) 


20,21;16:2,5,11,16;17:7,16; 


photo (1) 


participated (1) 


98:13 


18:1,5,14;19:9;20:8,9,16, 


19:19 


41:4 


Peninsula (11) 


20;21:6,13,16,19;22:9;23:6, 


physical (2) 


particular (6) 


134:13,18;135:8,13; 


15;27:6,11;28:2,5;30:6,18; 


112:20:162:10 


20:1;48:10;100:13;129:4; 


142:3;146:18;152:10,17; 


31:13;32:3,6,14;33:5,8,10, 


physically (1) 


138:7;158:14 


159:1, 12;166:2 


12,18,21;34:16,21;35:1; 


84:1 


particularly (2) 


people (6) 


37:19;38:2,8,10,14,20;39:2, 


PI (2) 


10:19;147:5 


41:21;49:15;148:8,16; 


8,12,16;40:12,14,17,21; 


124:3,4 


parties (3) 


151:11;164:13 


41:3,8,9,18;42:20;43:8,13, 


picture (4) 


4:3;59:4;125:9 


people's (1) 


17;44:1,2,4,15,18;45:16; 


19:13,17;20:2,4 


pass (2) 


47:8 


46:2,6,7,12,20:47:2,7,13,21; 


piece (2) 


56:13;113:11 


per (13) 


48:6,21;49:3;50:5;51:8,16, 


37:4;54:4 


passed (1) 


11:13;25:10;26:18;69:15, 


21;52:3,15,19;53:1,8,11,18; 


pieces (4) 


140:20 


16;70:3;96:7;122:1,2,4; 


54:1,14,17;55:10;56:1,6,16, 


46:21;49:17;117:21; 


password (14) 


130:16,16,17 


20;57:6,11, 15;58:9,12; 


121:2 


13:15;14:2;40:17;45:9; 


percent (5) 


59:13,19;60:7;62:1,9,11,20; 


piecing (1) 


49:10,1 1;54:2,9;57:3,5,17; 


25:7,13;26:16,20;162:10 


63:2,9,17,20;64:2,5,7,21; 


137:17 


58:2,8,12 


perception (1) 


65:8,13,15,18,21;66:3,7,12, 


PII (2) 


passwords (4) 


156:21 


14;67:14,19,21;68:3,16,20; 


78:18;137:19 


49:8,15;53:12;57:3 


perform (2) 


69:5,18;71:4,7;72:1,14; 


pilot (2) 


past (3) 


140:2;159:15 


73:10;75:19;76:1,6,20;77:3, 


35:10;36:7 


30:2;132:14;138:9 


performed (1) 


3,4,6,8,11:81:7,11,14,20; 


pilots (1) 


paste (2) 


47:5 


82:1;83:14,20;84:1,8,11,18, 


35:13 


88:11,15 


perhaps (1) 


19;85:3,7,10,14,16;86:7,9, 


place (8) 


pasted (3) 


19:1 


9;87:1,8,15,16;88:2,9,17; 


2:5;5:19;6:2;48:1;58:10; 


88:15,19;89:4 


period (3) 


89:1,4,12,15:90:3,8,13,15; 


82:13:88:4,5 


path (2) 


5:20;11:7;87:5 


91:3,8,19;92:7,16,20;93:10, 


placed (6) 


19:11;85:21 


permanently (1) 


17,17;94:4,8,1 1,14;95:1; 


68:20;74:9;85:14;124:1, 


pattern (1) 


117:17 


96:14;97:8,15;99:4;101:12, 


5;164:9 


140:16 


permission (3) 


13;102:5,10,13;103:6,19; 


placement (1) 


pause (1) 


101:15;118:21;119:1 


104:3,4,9,12,14,17,19; 


36:2 


162:7 


permissions (1) 


105:1, 15,19;106:3;107:1,4; 


places (1) 


pay (15) 


118:8 


108:11;109:2,8,12,20; 


157:1 


22:3;24:6,20;25:21;26:8; 


permitted (2) 


111:19:113:5,8,14,17,21; 


plagued (1) 


68:9;70:13,18;94:19;95:12, 


2:4,7 


114:3;115:20;116:17; 


65:21 


19;96:7;122:15;123:10; 


persistence (1) 


117:1,5,15:118:14,17,21; 


plain (3) 


124:15 


94:1 


119:6,15:120:1,4,7,10; 


49:10;57:3;58:15 


PDF (1) 


person (11) 


121:17;122:7,11;123:16; 


planning (1) 


73:16 


20:2,2,4;42:6;48:10; 


124:1,7,12;126:5,14;127:1, 


30:13 


PE12 (1) 


50:21;61:8;69:12;110:8; 


5,14,18:129:13,13,17,20; 


plans (1) 


143:19 


120:17;148:17 


130:2,6,14;131:3,13,21; 


95:15 


PE127 (1) 


personal (44) 


132:5,16,20:133:2,18; 


playback (1) 


40:6 


15:4,15;16:3,13,17;17:2, 


134:2;135:11, 12,17;136:1, 


155:14 


PE130 (1) 


5;20:12;21:7,14;38:5; 


4,6,16;137:1;138:5,18; 


please (4) 


56:11 


39:21;42:11;47:4;51:13,16, 


139:2,12;140:1,15,18; 


24:15;41:9;56:15;108:21 


PE145 (1) 


20;56:17;67:15,20;68:21; 


141:6,18:142:4,13,17; 


plot (1) 


115:13 


69:1;74:9;76:3;83:21; 


143:9,11,19,20:144:3,17; 


6:2 


PE42 (2) 


84:12,12;90:16;92:16;94:4, 


145:6:146:4,13,18,21; 


plus (2) 


18:3,5 


10;99:14;109:17;117:2,10; 


147:6,13:148:1,6,15,21; 


89:3;161:2 


PE47 (1) 


119:9,12,13,15;124:2,5,8, 


149:2;150:6,10,11,15; 


pm (3) 


111:11 


13;163:19 


151:4,9;152:3,8;153:18; 


1:16;46:12;167:9 


PE52 (1) 


personnel (4) 


154:10,16;155:1,21;156:9; 


point (11) 


LJ /.ll 




1 1 A*1 ^8*9 1 1 17* 
1 J /.V,!^, 1 Jo.Z, 1 1,1 /, 


7-91 •97-1 ■ r i.l'f> 7 R'^Q'7' 


PE92 (1) 


persons (2) 


159:13,15:160:1,10,20; 


47:12,13;67:2;71:21;83:11 


13:18 


10:1;112:13 


161:3,12;162:7,14;163:9, 


pointed (2) 


PE99 (1) 


pertaining (8) 


15;164:21;165:7,15;166:7, 


151:8;159:8 



Min-U-Script® 



Provided by Freedom of the Press Foundation 



(186) parochial - pointed 



United States vs. UNOFFICIAL DRAFT - Vol.21 

PFC Bradley E. Manning 7/25/13 Afternoon Session July 25, 2013 



pointing (1) 


52:5;1 12:4,19 


printed (2) 


141:11 


83:12 


Potomac (2) 


91:14,18 


projections (1) 


points (1) 


15:1,21 


prior (6) 


55:19 


29:9 


power (1) 


7:12;15:7,9;17:14;36:5; 


prompt (3) 


pole (1) 


148:14 


132:11 


65:10;89:19;101:19 


54:14 


PowerPoint (2) 


priorities (2) 


proof (1) 


policies (2) 


137:6;139:7 


42:9;80:12 


71:12 


131:8;149:12 


practice (1) 


privacy (1) 


propaganda (3) 


policy (6) 


107:2 


44:11 


141:15;157:5;159:1 


34:4;76:18;78:1,5;79:7; 


precise (2) 


Private (4) 


proper (2) 


129:7 


114:8;163:15 


10:20;11:9;13:14;119:2 


97:6;120:21 


politically (1) 


precisely (5) 


privileges (4) 


properly (3) 


60:3 


22:4;68:10;94:20;117:5; 


50:5;52:11;99:4,7 


31:19;74:16;107:18 


populates (1) 


124:16 


probably (3) 


Prosecution (103) 


110:7 


predeployment (2) 


22:11;58:19;106:5 


4:14;13:2;15:13,16,18; 


portal (1) 


151:3,7 


problems (1) 


16:3,4,18,18;19:7,13;27:20, 


143:17 


pre-deployment (1) 


151:17 


21;29:12;30:16;31:15,20; 


portion (12) 


140:4 


procedures (4) 


32:1,13,21;40:5;41:7;43:3, 


10:7,9;53:8,10;57:13; 


predict (1) 


7:5;24:10;26:3;36:13 


5;45:7;46:17,18;47:20; 


71:14,16;72:13;104:12; 


140:12 


proceed (1) 


51:14,15;53:16;54:7,12; 


111:21;112:2;122:10 


predictive (3) 


125:11 


55:20;62:8,17,19;63:5,14, 


portions (5) 


6:12;28:15;140:11 


proceedings (3) 


19;64:2;65:6;66: 18,20; 


14:7;20:18;21:3;37:12; 


PreFetch (3) 


2:5,9;4:1 


72:5,7,10,17,21;73:10,18; 


39:5 


85:17;86:4,6 


process (12) 


74:8,13,18;75:6,12,13,17; 


posed (4) 


prejudice (1) 


8:16;28:8;55:5,15;87:2,2; 


78:6,14;79:12;84:15,19; 


29:1,4;144:18;160:20 


133:21 


89:2;109:11;113:19; 


85:6;86:5;87:13;89:21; 


poses (1) 


prejudicial (1) 


115:19;117:5;156:8 


90:3,11;91:13,19;92:2,9,12; 


145:21 


131:13 


produce (1) 


104:7,11, 17,18:105:13; 


position (2) 


prepare (2) 


2:9 


111:7,9,13;113:20;114:10, 


71:5;106:21 


84:10;88:10 


produced (2) 


18;115:2,13;116:13; 


positions (2) 


present (9) 


32:2;129:5 


134:20;135:2;137:6;139:6, 


112:15;123:8 


4:3,4;59:4,5;72:15; 


producer (1) 


8,13;141:4;142:15;145:7; 


positive (1) 


125:10,10;154:2;155:5 


70:3 


153:12,21;154:7,13,19; 


157:1 


presented (3) 


product (6) 


155:3 


possessed (2) 


12:16;71:12;100:14 


28:16;69:9;110:7;136:7; 


Prosecution's (1) 


90:16;99:9 


preserved (1) 


140:2;141:6 


125:12 


possessing (1) 


35:21 


products (1) 


prosecutor (1) 


147:11 


press (2) 


28:9 


67:9 


possession (12) 


33:16;40:19 


professing (1) 


protect (14) 


22:4,8;29:19;68:10,13; 


presume (2) 


41:17 


6:10,17;19:18,19;21:21; 


94:20;95:3;124:16;136:21; 


143:6,7 


professional (1) 


34:4;37:21;49:7;57:17; 


141:16;152:11;154:12 


presumed (1) 


7:20 


68:6;94:16;138:16;150:3; 


possessions (1) 


30:6 


professionals (1) 


162:4 


17:17 


pretty (1) 


69:10 


protected (11) 


possible (2) 


46:21 


profile (2) 


13:15;18:17,21;19:1,5; 


91:4;108:21 


prevent (1) 


48:14;73:14 


36:2;37:5;45:6;53:4;119:7; 


possibly (1) 


49:14 


program (22) 


124:3 


140:21 


previous (5) 


9:10;28:11;51:3;59:18; 


protecting (2) 


post (4) 


7:1;38:10;39:8;61:10; 


63:21;65:1,4,13,14;69:4; 


37:15:150:12 


29:20;44:2;143:4;150:18 


161:10 


85:18;89:2,8;90:16;96:19; 


protection (4) 


posted (13) 


previously (3) 


97:15,17;99:19;100:1; 


29:10;49:21;50:11; 


30:8;31:9;35:4;75:11; 


117:20;123:17;127:8 


101:19;102:15;115:16 


142:19 


76:4;79:9;137:15;138:1; 


price (2) 


programming (2) 


protections (1) 


142:11;153:7,10;160:16,18 


25:10;26:17 


114:14;115:17 


57:19 


posting (2) 


primarily (2) 


programs (7) 


protocol (1) 


30:19;148:21 


35:8;71:13 


48:14;64:18;96:18; 


57:16 


posts (3) 


primary (1) 


100:15;101:8;102:18; 


protocols (1) 


30:2;77:17;146:14 


52:9 


115:18 


57:13 


potential (11) 


principle (1) 


progressive (1) 


proud (1) 


ZV. 1U, 10, JO. J, Jo. 10, 


l^to.o 


LOj.J 


Ly.y 


111:2;112:15;115:5; 


print (6) 


prohibited (4) 


prove (3) 


138:13;142:18;143:2;158:1 


54:3;72:5;82:10;83:11; 


64:12;100:17,21;102:10 


33:8:130:6,12 


potentially (3) 


84:5;86:21 


pro-insurgent (1) 


proved (2) 



Min-U-Script® 



Provided by Freedom of the Press Foundation 



(187) pointing - proved 



United States vs. 

PFC Bradley E. Manning 



UNOFFICIAL DRAFT 
7/25/13 Afternoon Session 



- Vol.21 
July 25, 2013 



131:13;135:21 
proven (2) 

118:2;157:6 
proves (1) 

139:12 
provide (6) 

5:18;29:14;80:8;143:1, 

16;165:9 
provided (12) 

10:13;14:3;20:21;28:1; 

53:19;56:6;60:6;127:2,8; 

155:21;161:6,12 
provides (9) 

22:4;49:21;56:2;68:10; 

94:20;110:13,17;112:9; 

124:17 
providing (3) 

21:3;80:3;141:21 
province (1) 

103:10 
public (25) 

22:16;36:5,17;37:7; 

41:18;42:7;44:13;67:12; 

108:6;126:8,16;127:3,12; 

131:2,9;136:3;142:1; 

145:16;148:3;149:13,15,15, 

19;150:1,12 
publication (5) 

21:18;22:6;68:2,12; 

154:14 
publications (1) 

141:7 
publicly (4) 

34:16;44:10;67:2;145:14 
published (17) 

60:1;67:1;68:4,16;72:4; 

77:4;88:14;92:18;93:6; 

94:15;95:1;109:8;127:19; 

130:7;145:16;158:21;159:4 
pull (1) 

6:1 
pulled (3) 

13:9,11;115:8 
Pulling (1) 

11:18 
purely (1) 

8:12 
purported (8) 

36:21;66:18;79:9;92:18; 

93:7,8,20;128:19 
purpose (8) 

28:21;102:20,20;110:1; 

114:2;118:16;123:19;155:7 
purposes (6) 

2:8,15;30:13;118:4; 

134:9;164:20 
push (1) 

11:13 
put (7) 

5:12;11:11;42:12;46:21; 

82:13;88:4;150:15 
putting (1) 

137:3 



Q 



quarter (3) 

35:10;84:2;89:16 
query (1) 

88:13 
quest (2) 

38:5;39:14 
quickly (4) 

57:4;89:2;113:14,17 
quotation (1) 

41:11 
quote (14) 

4:11;41:10,16;114:16,17; 

115:9;143:13,15;145:12,13; 

148:2,4,6;149:17 



R 



rack (3) 

25:21;26:9,9 
raid (1) 

154:8 
raided (1) 

153:3 
rainbow (8) 

46:13,19,20;48:4;56:2, 

21;57:1,7 
ran (2) 

86:1,7 
rank (3) 

112:3;121:21;122:1 
ranking (2) 

69:12;121:18 
ranks (2) 

131:19;162:19 
rapid (1) 

30:11 
rapidly (1) 

89:8 
rate (2) 

66:1;122:4 
rather (4) 

41:19;87:18;148:17; 

163:20 
reach (1) 

116:18 
reached (2) 

144: 19; 145:2 
reaction (7) 

40:14;42:18;43:16;45:21; 

75:20;105:18;127:11 
read (13) 

18:2;19:14,17;55:17; 

76:7;83:2;142:9,11;143:7, 

20;145:4;146:4;152:7 
reader (1) 

143:6 
readers (1) 

30:10 
readily (1) 

109:5 



reading (6) 

33:13;137:15;138:4; 

142:6;146:7,12 
ready (1) 

93:11 
real (1) 

165:10 
reality (1) 

39:10 
realized (1) 

39:8 
realtime (1) 

8:16 
reaping (1) 

81:21 
Rear (3) 

61:4,9;107:16 
reason (17) 

24:13,15;25:2;26:6,11; 

55:9;70:16,20;76:9;95:17, 

20;119:4;120:15,15;123:2, 

12;160:8 
reasonable (4) 

17:6;136:1;141:19;166:8 
reasonably (1) 

75:3 
rebuttal (1) 

126:2 
recall (3) 

52:1;77:5;118:3 
recalled (1) 

151:21 
receive (5) 

34:18;56:7;129:19; 

136:19;143:5 
received (16) 

9:1;30:3;41:2;96:4; 

137:7;139:11;146:14; 

152:16;153:14;156:18; 

158:7,8,9;164:2;165:20; 

167:2 
receives (1) 

129:2 
receiving (2) 

33:17,20 
Recent (1) 

29:13 
recess (11) 

58:18,21;59:2;124:20; 

125:4,6,7,13,17;167:5,8 
recessed (4) 

4:4;59:5;125:10;167:9 
reckless (1) 

127:5 
recklessness (2) 

130:13;133:2 
recognition (1) 

164:16 
recognized (3) 

131:10;158:2;159:13 
recognizing (2) 

21:4;164:12 
recollect (1) 



93:4 

recommendation (1) 

60:12 
recommends (1) 

124:20 
record (6) 

4:3;59:4;73:7;91:1; 

125:9;133:1 
recorded (3) 

13:7;66:5;75:12 
recording (1) 

2:7 

records (30) 

21:6,8,14,17,20;26:8,18; 

59:17;67:16,20;68:18,21; 

69:1,2,7;70:18;94:3,5,6,9; 

95:4,12,12,19;113:4;114:2; 

116:18;123:11;124:9;129:5 
recover (1) 

17:1 
recovered (3) 

17:13;113:21;116:9 
recruiting (1) 

138:6 
recruitment (2) 

154:20;157:13 
recycle (1) 

117:17 
red (1) 

36:19 
redactions (1) 

92:19 
redeploy (1) 

132:9 
redirect (1) 

6:7 

rednecks (1) 

166:13 
reduction (1) 

151:19 
reference (2) 

71:20;135:4 
referenced (2) 

27:4;111:14 
refers (1) 

71:14 
reflect (2) 

4:3;59:4 
reflected (4) 

32:21;73:18;74:13;125:9 
reflects (1) 

28:17 
refocusing (1) 

113:18 
reform (1) 

150:11 
refrain (1) 

47:10 
regard (4) 

28:12;35:7,19;100:2 
regarding (6) 

39:4;42:8;60:17;79:5; 

134:12;141:10 



Min-U-Script® 



Provided by Freedom of the Press Foundation 



(188) proven - regarding 



United States vs. UNOFFICIAL DRAFT - Vol.21 

PFC Bradley E. Manning 7/25/13 Afternoon Session July 25, 2013 



region (1) 


remaining (3) 


11:19;87:3;107:7;140:2 


16:1;103:20;115:12 


38:9 


71:16;93:18;103:21 


requirement (1) 


returning (3) 


regions (1) 


remedy (1) 


82:14 


17:16;39:16;81:17 


158:9 


84:9 


requirements (1) 


Reuters (1) 


regulates (1) 


remember (2) 


132:7 


42:21 


100:19 


64:11,15 


requires (1) 


reveal (2) 


regulation (3) 


remembered (1) 


130:5 


7:19;79:4 


57:20;101:3;124:4 


151:18 


rescue (4) 


revealed (3) 


reinstalled (1) 


reminder (1) 


51:2,9,12;57:19 


28:20;45:3;132:5 


15:12 


73:1 


research (5) 


revealing (1) 


reintroduce (1) 


remnant (2) 


28:19;46:20;65:13; 


141:2 


91:5 


17:3,11 


127:10;136:10 


reveals (3) 


reintroduced (1) 


removed (3) 


researched (3) 


4:12;72:8;123:5 


93:18 


19:5;108:18;109:5 


38:10;59:13;115:20 


revelation (1) 


relate (1) 


removing (3) 


researching (2) 


148:12 


107:10 


18:17;124:3;141:2 


39:12;161:8 


reveling (1) 


related (12) 


render (1) 


reserved (1) 


105:17 


10:19;42:21;46:3;76:18; 


112:19 


99:3 


reverse (1) 


83:2;84:21;96:7;104:1; 


repeated (2) 


resided (1) 


54:1 


105:8;114:14;116:10; 


142:6;152:5 


80:13 


review (3) 


136:10 


repeatedly (5) 


resorted (1) 


16:11;30:7;160:17 


relates (2) 


34:9,10;59:14;126:18; 


50:5 


reviewed (4) 


22:19;34:12 


136:11 


resource (3) 


7:2;36:4;59:15;126:18 


relating (1) 


repercussions (1) 


7:17;56:2;77:20 


reviewing (1) 


129:4 


146:3 


resources (5) 


166:4 


relations (5) 


report (31) 


21:21;42:9;68:6;94:16; 


Reykjavik (4) 


75:1,5;79:5,6;128:21 


4:19;9:15;16:16,20; 


110:4 


40:2;60:5;76:21;81:19 


release (22) 


27:18;28:1,10,12,19;29:3, 


respect (1) 


right (13) 


23:12;29:4,6;31:4;33:16, 


21;30:5;31:2,4,11,19;32:9, 


106:12 


11:12;33:6;54:19,20; 


17;35:1;36:5,9;38:3;41:18; 


15;33:8;34:12;126:21; 


responded (1) 


56:14;62:12,14;84:5;94:3; 


45:5;75:20;77:13;94:13; 


128:1, 1;129:9;142:12; 


56:12 


111:16;125:1;133:13;167:4 


105:20;112:18;127:7,16; 


144:5;145:5,7,10,11,20 


response (2) 


rights (3) 


141:21;142:21;164:2 


reporter (4) 


5:11;37:10 


68:17;79:1;95:3 


released (42) 


2:3,3,14,17 


responses (3) 


RIP/TOA (1) 


4:11;7:18;19:6;21:20; 


reporting (7) 


4:21;24:11;26:4 


33:6 


30:2;34:16;37:7;38:7,11; 


2:13;9:8;67:12;80:10; 


responsibility (3) 


rippling (1) 


39:9,13;40:16;41:5;44:13, 


143:10;144:12;152:1 


81:6;99:15;138:12 


105:19 


14;45:4,21;66:17;67:2; 


reports (17) 


responsible (2) 


risk (3) 


75:8,15;93:8,21;105:12; 


8:3,4,6;19:4;22:13;34:2; 


5:9;7:9 


79:1;124:3;131:4 


106:3;126:8,16;127:2,9,12, 


43:20;126:19;128:9,13,20; 


responsive (1) 


road (1) 


14,21;128:3,5,11,19;134:6; 


129:3;136:10;142:10; 


96:4 


6:2 


136:5;153:16;154:10,20; 


146:5,6;156:6 


rest (2) 


ROE (1) 


157:3 


report's (1) 


81:3;120:9 


143:14 


releases (1) 


29:8 


restrictions (3) 


role (1) 


29:13 


reposed (1) 


82:13;88:4;91:2 


43:18 


releasing (3) 


138:15 


result (4) 


room (4) 


128:16;146:11;162:20 


repository (2) 


77:6;80:5;132:20;147:10 


2:5;42:4;44: 19; 113:7 


relevance (1) 


131:8;149:11 


resulted (1) 


rooms (1) 


113:16 


represented (1) 


103:11 


102:2 


relevant (1) 


142:18 


results (6) 


rotations (1) 


148:10 


represents (1) 


81:19;86:16;87:19; 


147:7 


relied (2) 


29:10 


114:14;115:4,12 


roughly (1) 


6:12;120:11 


reputation (1) 


Retired (2) 


160:13 


relies (2) 


146:9 


67:7;107:12 


route (3) 


133:18;148:14 


request (4) 


retrieve (4) 


5:20;6:7;156:10 


relocate (4) 


27:5;42:15;71:3;72:1 


27:5;72:2;123:14;134:7 


Royer (13) 


70:7;72:1;95:6;122:17 


requesting (2) 


retrieved (1) 


98:3,8,15,17;101:17; 


relocated (1) 


97:16;153:6 


27:10 


102:1;110:20;112:5;113:3; 


23:16 


requests (4) 


retrieves (1) 


118:3;120:14;121:12,18 


reiy (i) 


97-R-70-7-CK-S- 1 99- 17 
Z / .0, /U. / ,yj. J, 1ZZ. 1 / 


Qfi- 1 9 

vo. iz 


ruling (i) 


133:8 


require (1) 


return (2) 


134:15 


remainder (1) 


27:3 


83:8;114:17 


run (11) 


125:11 


required (4) 


returned (3) 


50:15;64:3;85:2,16;86:3, 



Min-U-Script® 



Provided by Freedom of the Press Foundation 



(189) region - run 



United States vs. 


UNOFFICIAL DRAFT 


- Vol.21 


PFC Bradley E. Manning 


7/25/13 Afternoon Session 


July 25, 2013 


9,10;89:7;96:19;101:19,21 


SCIF (3) 


21;53:2;57:12;58:1,2,10; 


12:12,21;32:20,21;87:11, 


running (4) 


45:18;97:18;108:18 


61:6;79:15;80:19;107:14; 


12,20;102:21;104:18; 


64:6;65:5,20;88:9 


scope (3) 


112:13,20;113:12;131:18; 


114:7;120:17,18 


runs (1) 


132:5;147:14,16 


132:8;144:16,18;162:11,12; 


servers (5) 


85:19 


Scott (1) 


164:10 


12:6,8,11;13:5;90:2 


Russia (2) 


44:11 


seeing (1) 


serves (2) 


149:18;150:16 


scrape (2) 


132:13 


30:18;159:1 




87:11;102:21 


seek (12) 


service (14) 




s 


scraped (1) 


24:5,8;25:20;26:1;41:18; 


9:18,20;25:3,6,12;26:12, 




68:19 


70:12,14;95:11,14;113:4; 


15,20;35:17;71:2;120:11; 




S2 (4) 


scrapes (1) 


122:14,21 


121:8;131:14;133:21 


80:17;111:6;113:6; 


98:18 


seeking (1) 


services (20) 


143:13 


screen (3) 


145:3 


22:3;24:4,8;25:19;26:1; 


sad (1) 


11:13;18:4;102:6 


seem (1) 


29:15;68:9;70:5,11,14; 


132:2 


script (2) 


161:20 


94:19;95:10,14;96:11; 


Sadtler (1) 


90:16,21 


seems (1) 


122:14,21;123:5,10;124:15; 


102:4 


scrolled (1) 


12:13 


143:1 


safe (2) 


106:15 


selecting (1) 


session (3) 


48:1;119:7 


scrolling (1) 


116:6 


71:12;72:19;151:7 


safeguard (2) 


61:20 


self(l) 


set (11) 


8:3;137:2 


SD (14) 


45:2 


25:1;26:10;59:9;70:20; 


safekeeping (1) 


4:15;13:17,20;14:19,21; 


self-admitted (1) 


77:8;95:20;103:2;108:18; 


15:5 


15:5,5;17:17;18:1;19:16; 


146:9 


110:3;113:18;123:11 


safest (1) 


20:6,9,12;21:14 


self-described (1) 


sets (1) 


156:10 


Sean (1) 


144:8 


4:7 


salary (2) 


110:18 


self-executable (1) 


setting (1) 


69:15;122:6 


search (35) 


100:6 


47:9 


SAM (15) 


43:2,6,8,8;46:13,19; 


self-help (1) 


seven (2) 


49:19,19;50:1, 12,16; 


47:10;48:4,16;56:21;72:8; 


84:9 


10:5;16:8 


52:5;53:20;54:18,19,21; 


83:7,7;84:4,21;85:1,4; 


self-initiated (1) 


several (5) 


55:6,12;56:3;57:14;58:7 


86:15,15;87:19;96:2,3; 


28:9 


75:19;131:5;149:9;153:4; 


same (31) 


105:14;114:13,16,20;115:1, 


send (1) 


158:4 


12:9;14:2,13;17:21; 


4,4,9,12;116:19;118:8; 


120:17 


severed (2) 


18:10;19:14,15;36:8;40:7; 


144:4;145:8 


senior (2) 


108:12,17 


52:2;55:15;63:10;74:3; 


searchable (3) 


28:14;36:7 


share (6) 


81:8;90:12;92:15;105:21; 


131:9;149:12,14 


sense (3) 


12:9;38:17;43:15;61:15; 


106:15;108:10,16;110:21; 


searched (12) 


2:16;139:18;166:5 


80:6;100:9 


116:17;117:5,19;131:1,11; 


34:9;46:6;60:8;72:8; 


sensitive (11) 


shared (1) 


132:2;153:8;154:20;156:8; 


76:1;82:18;84:20;96:7; 


29:14,19;30:8;36:6;78:3; 


81:8 


159:15 


105:15;109:9,11;160:11 


79:4;119:15;124:4;137:3; 


SharePoint (5) 


sanitized (1) 


searches (2) 


160:18;162:4 


104:8,18,19;106:11; 


36:4 


42:21;160:13 


sensitivity (3) 


114:6 


sat (2) 


searching (3) 


37:15;38:1;112:14 


sharing (3) 


18:21;19:2 


64:2;84:18;142:6 


sent (3) 


80:2,1 1;82:15 


save (11) 


Second (9) 


77:17;80:15;143:11 


Shaver (51) 


8:16;62:13;82:11;83:1, 


49:16;56:14;58:7;73:13; 


separate (1) 


12:19;13:16,19;14:14; 


11;84:5;85:18;86:21;87:19; 


88:17;115:9;127:4;144:2; 


96:5 


17:1;32:3;48:8;49:6,14; 


116:5,6 


153:15 


separately (1) 


50:13,20;51:4,7;52:2,4; 


saved (2) 


secondly (1) 


9:11 


53:7;54:5,15,16;55:14; 


73:12;76:2 


125:19 


September (1) 


56:21;58:4;62:11,14;63:6, 


savvy (1) 


seconds (2) 


79:21 


10;64:1,5,16,21;65:8;72:13, 


163:6 


46:16;74:4 


Sergeant (10) 


17;73:4,19;83:4,17;84:21; 


saw (8) 


secret (17) 


6:18;7:11;102:4;113:5; 


85:9,12,21;87:14,16;88:14, 


37:14;38:10,14;43:18; 


22:11;23:3,11;31:11,20; 


116:11, 15;118:20;151:14, 


21;89:6,9;93:14;101:20; 


77:7;105:19;109:2;112:14 


37:3;61:7;66:21;79:16; 


15,17 


104:2,21 


saying (1) 


101:15;106:5,7,13,14,16; 


series (2) 


sheet (2) 


43:19 


107:15,18 


78:15;79:13 


125:15,18 


scale (1) 


secrets (2) 


serious (6) 


shift (3) 


20:8 


138:16;163:4 


23:2;31:5;61:6;75:4; 


56:16,17;97:4 


schemes (1) 


section yz) 


7Q. 1 A. 1 f~)7' 1 A 


shoe (2) 


119:21 


44:12;45:9 


serve (1) 


39:21 ;40:8 


Schmirtle (21 


security (25) 


59:10 


.~1 H/WIY ^ 1 J 


41:8;43:19 


23:2,12;31:5;50:9;52:21, 


server (12) 


132:17 



Min-U-Script® 



Provided by Freedom of the Press Foundation 



(190) running - shook 



United States vs. UNOFFICIAL DRAFT - Vol.21 

PFC Bradley E. Manning 7/25/13 Afternoon Session July 25, 2013 



shop (3) 


13;138:1;141:1 


slide (2) 


souvenir (1) 


80:17;113:6;143:13 


signified (1) 


137:6,11 


43:16 


short (3) 


63:7 


slow (1) 


space (3) 


48:19;87:5;112:17 


signing (1) 


62:15 


17:9;117:4,15 


shortest (1) 


151:18 


smart (1) 


span (1) 


91:4 


signs (1) 


81:15 


79:9 


shortly (1) 


155:15 


smil (1) 


spark (2) 


109:8 


similar (7) 


143:18 


148:17;150:10 


shoulder (1) 


25:5;26:13;37:13;73:17; 


smiling (2) 


spear (4) 


151:8 


82:21;140:16;151:11 


19:15,19 


98:16;119:20;120:2,3 


show (9) 


simple (4) 


snapshot (1) 


Special (61) 


13:4;16:5;24:10;26:3; 


65:3;86:12;115:17;150:5 


155:14 


12:19;13:16,19;14:14,21; 


62:7;72:18;75:9;92:14; 


simpler (1) 


social (1) 


16:21;28:9;32:2;48:8;49:6, 


137:6 


90:20 


98:16 


14;50:13,20;51:4,7;52:1,4; 


showed (9) 


Simply (2) 


society (1) 


53:7;54:5,14,16;55:14; 


36:17;63:12;66:20;91:10; 


5:12;150:15 


139:19 


56:21;58:4;62:11,14;63:6, 


92:9;136:6;141:7;153:17; 


single (9) 


software (6) 


10;64:1,5,16,21;65:7;72:12, 


154:21 


17:3;31:4;76:20;82:11, 


55:15;64:8;97:1;99:1,3,7 


17;73:4,19;79:8;83:4,17; 


showing (8) 


11;89:15;91:20;101:10; 


sold (1) 


84:20;85:9,12,20;87:14,16; 


54:17;104:8,13,19,20; 


164:9 


149:18 


88:13,21;89:6,9;93:14; 


108:1;128:20;165:15 


SIP (1) 


soldier (19) 


101:20;104:2,21;109:7; 


Showman (5) 


81:12 


33:6;42:8,10;100:13; 


114:12;115:14;116:2,9,15; 


38:15;151:3,6,13,21 


SIPR (1) 


113:10;121:11,16,21;133:5, 


128:18 


shown (2) 


81:12 


6,8,12;141:8;148:18,18; 


specialist (6) 


40:3;85:6 


SIPRNET (70) 


164:6,7,19;166:17 


69:13,14;111:5;121:19; 


shows (25) 


7:15,16;10:6;11:20; 


soldiers (22) 


122:1,6 


15:6;32:6;35:13;40:6; 


12:15;19:6;21:12;22:15; 


6:10,17;7:1,6;19:20; 


specific (15) 


51:20;54:21;59:21;62:9,20; 


31:7;32:11;33:5;36:3; 


38:15;64:12;80:16;81:10; 


12:3;28:15;44:14;71:14; 


63:2;64:2;76:8;84:19;86:6; 


38:17,17;39:19;42:15;43:9; 


96:17;97:18;99:19;113:2; 


72:13;83:9;88:9;95:16; 


89:21;90:3,11;91:19;92:2, 


44:7;45:17;46:3,6,12;47:15, 


121:18;124:2;132:11; 


96:3;122:21;140:6;147:6; 


12,13;104:17;135:18; 


18;48:6,9,16;49:1;50:7; 


137:14;138:2;150:3; 


152:10;156:4;162:3 


150:6;164:21 


52:19;53:6,9,20;56:8,20; 


155:13;162:6;166:12 


specifically (29) 


shy (1) 


57:6,21;58:13;61:15,16; 


sole (1) 


16:4;21:19;24:3;25:18; 


56:18 


72:9,14;76:2;80:4,6,9,14; 


166:17 


29:3;30:20;34:13;51:9,16; 


side (4) 


85:15;92:12,15;100:12; 


somehow (1) 


53:1;57:16,17;64:13;68:3; 


54:19;55:3,7;56:14 


102:15;103:16;104:6,13,15; 


36:17 


71:20;74:20;80:8;94:14; 


SIGACT (11) 


106:11;107:3;108:11,17; 


someone (3) 


99:17;105:14;107:5; 


4:18,19;5:4,6;6:19;13:9; 


109:6;113:11;129:6;139:2; 


52:13;101:17;161:14 


134:12;135:10;142:2; 


16:21;17:8;22:12;26:14; 


143:19;161:5;163:14,18; 


soon (1) 


148:6;152:13;159:8;160:2; 


129:10 


164:1;165:13 


39:9 


166:6 


SIGACTS (74) 


sisters (1) 


sorry (2) 


specification (31) 


4:10,15,17,20;5:12,14,16; 


119:16 


45:12;98:3 


27:15,17;34:20;45:10,12; 


6:1,9,15,16;7:3,8,13,14,15, 


sit (1) 


sort (3) 


47:1;59:8,10,11;64:20;71:3, 


16;9:2,21;10:8,10,12,14,19; 


19:18 


35:21;50:6;150:13 


9;76:15;103:4,4;106:4; 


11:2,3,6,8,15,18;12:14; 


sites (7) 


sorting (1) 


107:9;108:8,8,9,13,15; 


13:9,12;14:8,19;15:4;17:2, 


69:4;73:8;98:18;138:8; 


161:18 


109:14,16,19;126:4,10,11, 


3,12,19;18:1,11,20;19:17; 


141:11;157:12;162:6 


sought (1) 


12;130:5;131:15 


20:7;21:1,9;22:6;23:10,11; 


sitting (1) 


160:2 


Specifications (6) 


24:1,5,6,21;25:5,7,10,16,20, 


102:7 


source (11) 


4:8;22:10,19;76:14; 


21;26:9,16,18;39:5;43:21; 


six (5) 


10:3;18:20;19:2;37:1; 


103:2;166:9 


128:6,12;134:4;140:20; 


11:2;57:8;161:3,5,8 


40:20;42:18;43:9,11;75:18, 


specified (1) 


152:14,21;153:9;156:2; 


SJ (1) 


20;138:20 


99:3 


159:18 


103:20 


sources (13) 


speed (1) 


sight (1) 


skilled (1) 


6:17;10:2;28:11;37:15; 


53:11 


58:15 


150:18 


45:6;53:13;75:1;76:18; 


spending (1) 


signed (2) 


skills (2) 


78:18;79:1,6;134:11,14 


166:6 


107:5;138:11 


10:21;42:11 


South (1) 


spent (3) 


significance (3) 


slash (3) 


81:2 


63:18;69:21;90:8 


18:7,12;28:12 


143:17,17,18 


SOUTHCOM (5) 


splash (2) 


SlgnillCalll y± / ) 


sieep y±) 


OU. lz,CO. 1 J 7 /U.l j,1o, 




4:12,20;9:14;18:13,16; 


121:16 


129:10 


splits (1) 


21:21;22:5;68:5,11;94:16, 


slice (2) 


Southeast (2) 


49:17 


21;101:2;124:17;128:10, 


85:18,19 


80:20;81:1 


spot (1) 



Min-U-Script® 



Provided by Freedom of the Press Foundation 



(191) shop - spot 



United States vs. 


UNOFFICIAL DRAFT 


- Vol.21 


PFC Bradley E. Manning 


7/25/13 Afternoon Session 


July 25, 2013 


164:10 


status (3) 


subexhibits (1) 


tables (7) 


spreadsheet (2) 


9:16;66:9;107:7 


78:8 


46:13,19,20;48:5;56:21; 


14:13;89:5 


statutory (3) 


subfolder (1) 


57:1,1 


staff (4) 


24:2;25:17;121:5 


103:17 


tactic (1) 


100:9;116:11,15;131:21 


stay (3) 


subject (2) 


141:15 


staggering (1) 


71:4;133:7;161:20 


39:13;77:2 


tactical (12) 


90:1 


stayed (1) 


submission (1) 


5:10,16;8:1,3,4,6,19;9:4; 


stand (2) 


15:2 


69:4 


128:9,13;155:11;160:3 


95:7;111:15 


steal (3) 


submit (2) 


tactics (4) 


stands (2) 


10:7;82:2;114:4 


109:1;145:15 


7:4;24:10;26:3;36:12 


115:14;151:5 


stealing (3) 


subsequently (1) 


tale (1) 


start (2) 


66:12;69:7;81:20 


32:16 


38:8 


19:1 1;126:1 


stellar (1) 


substantially (2) 


talk (3) 


started (4) 


133:1 


68:16;95:2 


20:15;92:1;125:6 


45:16;62:12;93:4;113:6 


step (1) 


success (1) 


talked (3) 


Starting (6) 


117:16 


66:1 


45:2;69:2;92:4 


10:21;45:18;93:11,19; 


steps (7) 


successful (9) 


talking (3) 


105:11;161:4 


5:11;45:1;57:18;88:9; 


5:7;8:2;63:11, 12,16,17; 


48:3;59:20;66:4 


starts (1) 


117:19;163:16;167:1 


120:5;156:3,13 


talks (1) 


133:15 


stick (1) 


successfully (4) 


41:15 


state (36) 


45:3 


16:11;53:8;57:12;63:9 


Tampa (4) 


36:21;75:14;77:13,16,17; 


still (2) 


suffering (1) 


12:6,12,21;13:6 


78:16;79:18;80:3,9;82:7; 


16:14;102:7 


151:17 


Tann (2) 


84: 13;86: 1 1 ;87: 1 1,21 ;90:2, 


stipulation (8) 


summary (7) 


77:15,19 


4;92:18;103:1;107:6; 


31:16;134:21;135:3,6; 


32:2;43:3;54:4,16;63:2; 


tar (1) 


128:16;134:4;148:13; 


153:1, 11,20;154:6 


67:11;104:12 


13:15 


149:7,20;152:14;153:7; 


stole (8) 


superiors (1) 


target (3) 


154:3,9,12,21;155:4; 


45:19;59:19;66:16;69:18; 


140:6 


39:15;114:10;123:18 


157:15,20;159:19;163:3; 


77:4;121:17;122:8,11 


supervisor (2) 


targeting (2) 


164:8 


stolen (2) 


118:20;119:1 


29:17;30:13 


stated (5) 


78:17;109:13 


supplemented (1) 


Tasha (1) 


20:20;34:7;92:20;101:9; 


stood (1) 


23:19 


110:18 


158:3 


19:15 


supply (4) 


task (5) 


statements (2) 


stop (1) 


5:20;6:2,7;113:7 


83:21;88:8;113:21;114:1, 


136:12;147:12 


59:20 


support (3) 


3 


STATES (103) 


storage (2) 


81:10;107:21;165:14 


tasked (1) 


1:2,4;9:6;10:4;18:16; 


100:17;101:3 


supposed (1) 


5:18 


21:21;22:5,7,15,20;24:9; 


store (3) 


133:13 


tasking (3) 


26:2;27:8,10;28:3,4;29:2; 


7:15;48:11,13 


sure (2) 


20:14;84:12,13 


30:14;33:8;35:2;36:19; 


stored (11) 


40:21;55:11 


tasks (1) 


44:17;46:1;49:2;57:10; 


13:14;14:8;18:2;21:10; 


surrounding (1) 


115:19 


60:7,15, 17;61:3;68:5,11, 13; 


61:14,19;67:16;94:6; 


103:13 


taught (6) 


69:13;70:6;71:8,12,13,19, 


103:14;124:9;129:6 


system (49) 


36:8;138:3;139:7,12; 


21;75:5,16;76:10,17;78:1,4; 


storing (2) 


9:8;15:13;19:6;21:10; 


157:10,10 


94:16,21;95:5,15;96:12; 


49:9,17 


36:3;43:9;49:18,19;50:1,6, 


T-drive (3) 


102:9,16;103:14;105:5; 


straight (2) 


8,12,15,16,19;51:2,11,12; 


100:9,12;101:5 


107:10;108:3;119:7;120:3; 


87:18;121:15 


52:5,7,13,18,21;53:3;55:13; 


teach (1) 


122:17;123:7,8,13;124:17, 


strategic (1) 


58:1;61:16;64:6;67:17; 


7:18 


19;129:5;130:6;131:12; 


95:15 


80:7;83:20;88:4;91:2;94:7; 


teaches (1) 


132:13;134:10,12,17,19; 


strategies (2) 


98:13;99:10,13;100:20; 


36:9 


135:9,14,21;136:18,20; 


24:11;26:4 


109:16,21;117:8,9;118:15, 


technical (2) 


137:19;143:3;144:12; 


strength (1) 


18;119:8;120:11;124:4,9; 


82:12;99:20 


146:10;148:6,18;150:2,13; 


123:5 


164:16 


techniques (3) 


151:4;153:2;154:5,8; 


strengths (1) 


systematically (1) 


7:5;24:10;36:13 


155:19;156:1,7;157:8; 


140:9 


165:12 


technologically (1) 


159:7,16;161:7;164:4; 


structure (1) 


systems (5) 


163:6 


165:7,8,16;166:1,3,18 


112:16 


47:15;108:2;110:2;120:9; 


technology (3) 


States' (2) 


study (2) 


165:9 


35:14,15;36:14 


68:17;95:3 


11:6;140:11 




telling (3) 




stating (1) 


studying (i) 


T 


66:13;80:16;151:21 
term (3) 


143:13 


140:3 




AUlllUlltU f 


stumbling (1) 


table (5) 


86-1 5-89-1 -1 1 5-4 


11:21 


42:6 


8:11;27:6;29:5;56:2;57:7 


terms (2) 



Min-U-Script® 



Provided by Freedom of the Press Foundation 



(192) spreadsheet - terms 



United States vs. UNOFFICIAL DRAFT - Vol.21 

PFC Bradley E. Manning 7/25/13 Afternoon Session July 25, 2013 



2:15;46:6 


96:9;135:15 


123:17;127:20;128:17; 


transmit (3) 


terrorism (1) 


thereof (1) 


132:19,19;134:15;162:7; 


90:21;117:12;129:17 


129:7 


20:18 


163:16;167:1 


transmitted (5) 


terrorist (14) 


Third (3) 


tool (4) 


31:9;42:2;45:20; 134:3; 


8:9;29:15;34:14;60:19, 


127:10;145:5;154:3 


65:11;102:15;145:13; 


162:17 


20;61:2;137:7;138:6,8,19; 


THOMAS (1) 


159:2 


treat (1) 


143:2;153:21;154:20;157:6 


3:13 


tools (2) 


107:3 


terrorists (6) 


Though (1) 


60:6;115:18 


treated (2) 


60:18;61:1;139:14; 


34:21 


TOOMAN (1) 


31:14;35:20 


145:13;157:12,19 


thought (9) 


3:12 


treatment (1) 


tester (1) 


20:4;38:2;42:7;44:8,20; 


top (9) 


44:16 


113:19 


76:21;81:15;113:9;165:5 


31:11;54:11;55:21;66:21; 


trend (1) 


testified (164) 


thousand (3) 


71:14;91:14;106:7,14; 


140:12 


5:15,17;6:11,21;7:11,21, 


131:5;149:9;158:4 


113:4 


trends (3) 


21;9:10,21;10:18;12:5,19; 


thousands (2) 


topics (2) 


6:6,14;11:7 


13:8,11, 19;14:1,4,14,21; 


11:1;117:3 


37:1;46:1 


tried (1) 


15:20;16:10;22:2;23:1,9, 


threat (10) 


torture (1) 


58:12 


21;24:3,19;25:15,18;26:7; 


29:1,4,1 1;60:14;128:2; 


79:2 


tries (2) 


28:7;32:13,18;35:20;36:7; 


131:18;136:9;142:20; 


total (4) 


110:21;163:11 


38:16,18;44:1,12;49:6; 


144:18;145:21 


11:14;106:8,9;126:5 


trigger-happy (1) 


50:13,20;51:4,7;53:7; 


threats (3) 


tour (1) 


166:13 


54:15;55:4;57:1;61:4,13, 


28:15;140:6,7 


8:14 


trip (1) 


18;62:11,14;63:6;64:1,5,12, 


three (14) 


towards (1) 


145:5 


21;65:8;66:3;67:8;68:8; 


7:3;14:5,16;16:6,9;29:9; 


44:5 


Tripp (1) 


69:8,1 1,19;70:10,17;73:4, 


43:16;61:11;125:15; 


town (1) 


64:11 


19;77:15,19;79:8,11,16; 


129:20;142:9;146:4,7,12 


103:10 


troop (3) 


80:1,7,13,15,18,21:81:4; 


throughout (1) 


track (4) 


9:15;107:20;108:1 


82:4,8,17,20;83:4,13,18; 


165:1 


9:11,12,15;141:9 


troops (1) 


84:21;85:9,12;87:6,14,16; 


throwing (1) 


tracks (1) 


107:21 


88:14;89:6,9,14;90:15; 


162:19 


47:3 


trophies (1) 


93:14;94:18;95:9,18;96:1,6, 


Thursday (1) 


traditionally (2) 


165:3 


17,21;97:3,11,13,20;98:3,9, 


1:16 


52:12;101:6 


trophy (1) 


15,20,21;99:2,6,8,12,14,16, 


Thus (12) 


train (1) 


20:10 


19;100:2,4;101:1, 11, 17,20; 


21:2;23:3;61:6;69:20; 


80:19 


troubled (2) 


102:1,5;104:2;105:1; 


80:13;91:5;107:15;122:6; 


trained (9) 


20:2;166:16 


106:18;107:2,12,17,19; 


123:9;129:12;133:20; 


7:12;10:21;42:8;106:19; 


true (8) 


109:7;110:6;113:3;114:13; 


159:20 


107:2;136:7;150:3;156:9; 


4:13;37:2;75:9;129:11; 


116:2,16;118:4,7;120:14; 


tie (3) 


165:8 


141:3;147:5;150:21;152:19 


121:7,12,18;122:13;123:9; 


48:12,15,17 


training (15) 


truly (1) 


124:14;128:18;129:9; 


tier (1) 


18:7,10;37:19;42:11; 


4:16 


131:16;132:4,12,19;133:4; 


28:10 


44:9;60:19;120:13;136:17; 


trust (5) 


140:14;151:13,18;158:13 


timeline (1) 


138:17;141:5;146:17; 


133:7,18;138:15;164:13; 


testimony (15) 


118:1 


147:6;157:10;162:20; 


165:11 


2:16;9:13;31:17;64:15; 


times (21) 


165:11 


trusted (3) 


72:12,19;100:10;110:20; 


11:13,14;13:4;16:8; 


traitor (2) 


133:3,4;165:9 


116:13;124:1;135:6;151:6; 


25:14;26:21;32:20;33:2,3; 


166:20,20 


trusty (1) 


155:10;156:20;157:15 


34:3;43:1,1,9;46:6;51:9; 


transcript (6) 


53:13 


testing (1) 


90:5,6,13;105:16;106:14; 


2:2,10,12;36:16;37:11; 


truth (1) 


98:14 


160:12 


45:4 


148:12 


theater (4) 


titled (1) 


transfer (3) 


try (1) 


4:20;39:16;136:8;160:14 


105:2 


15:8;117:9;123:18 


149:20 


theaters (2) 


today (2) 


transferred (1) 


trying (2) 


12:7;155:21 


125:21;165:18 


15:3 


117:17;148:17 


theft (4) 


together (3) 


transferring (3) 


T-SCIF (1) 


21:8;94:5;109:17;124:8 


46:21;88:18;137:18 


69:1;123:20;161:16 


39:20 


thefts (1) 


told (7) 


transgressions (1) 


TTP (6) 


20:8 


33:21;97:4;107:8;120:1; 


47:7 


9:19;37:8;107:20;140:4; 


theme (1) 


127:1;131:4;142:10 


transition (1) 


155:14;156:6 


44:4 


took (26) 


71:1 


TTPs (8) 


inereaiier yi) 


T. C.C.I 1.1 A. 1 O.O/1 . 1 


nansiaieu y±) 


H- .L i , / . Ly ,Z*t. 1U, iZ,ZO. J, 


77:8 


39:20;44:19;45:1;57:18; 


2:14 


60:19;123:7;140:17 


Therefore (6) 


69:19;77:12;79:20;117:16, 


transmission (5) 


turn (1) 


11:8;39:15;65:3;69:21; 


19;119:3,6;122:8,11; 


15:7;17:8,14;90:9;91:12 


44:15 



Min-U-Script® 



Provided by Freedom of the Press Foundation 



(193) terrorism - turn 



United States vs. 


UNOFFICIAL DRAFT 


- Vol.21 


PFC Bradley E. Manning 


7/25/13 Afternoon Session 


July 25, 2013 


turned (3) 


underlying (1) 


unquestionably (2) 


12:11;80:6;85:10;110:10; 


53:13;63:20;84:6 


67:10 


126:7,15 


122:12 


turning (1) 


undermine (1) 


unredacted (2) 


user's (4) 


84:8 


157:16 


93:21;111:15 


52:11;78:12;110:13; 


twice (1) 


underscore (3) 


unsatisfactory (1) 


118:19 


105:16 


14:9,10,10 


39:11 


uses (4) 


two (22) 


understands (1) 


unsecure (1) 


49:13;98:10;130:3; 


7:1,6;11:3;14:12;45:17; 


7:14 


119:12 


141:12 


49:17;50:1;53:13;57:20; 


understood (8) 


untracable (1) 


USFI (1) 


66:12;71:2;107:4;116:9,12; 


83:20;131:4;138:5;139:2; 


144:9 


114:9 


130:17;138:11,11,17; 


150:6;154:15;158:11; 


up (14) 


using (30) 


151:20;154:4;165:19,19 


166:21 


12:11;53:11;54:21;63:12; 


6:6;14:2;28:15;45:16; 


two-week (1) 


Undeterred (1) 


71:9;79:10;83:8;87:18,19; 


50:14;52:6,19;55:14;57:19, 


91:7 


91:2 


102:8;115:5;119:12;131:7; 


21;58:11;59:18;60:6;62:12; 


txt (6) 


unedited (1) 


149:10 


68:19;78:21;81:9;82:19; 


17:13;40:6;74:8;92:11, 


2:12 


uploaded (1) 


83:14,19;86:14;87:20;88:5; 


13;1 16:6 


unfettered (1) 


40:1 


89:15,18;96:2;102:14; 


type (18) 


165:17 


uploading (1) 


109:21;118:15;142:4 


5:7;8:8;9:4;23:1,4,5;36:8; 


unilaterally (1) 


161:19 


utility (4) 


65:9;83:6;107:13;116:6; 


34:17 


uploads (1) 


16:2;51:15,20;150:6 


124:15;130:9;146:19; 


unique (6) 


66:9 


utilized (1) 


156:17;158:1,8;160:2 


49:12;61:16;65:16;77:20; 


upon (4) 


138:6 


types (4) 


88:12;155:20 


34:16;56:1;120:11; 


utter (1) 


31:2;66:8;116:10;138:6 


unit (20) 


148:14 


130:12 


typical (1) 


5:7;7:2,8;10:18;38:15,17; 


upset (2) 


utterly (1) 


34:4 


64:10;77:11;97:4;107:1; 


113:8,10 


39:10 


typically (1) 


111:4;112:15;123:5;132:6, 


urged (1) 






120:5 
typing (2) 


20;133:19;137:19,20; 


127:7 
use (37) 


V 


155:14,16 




84:3;86:15 


UNITED (103) 


4:9;5:13,14,16;6:9;7:13; 


VA(1) 




1:2,4;9:6;10:4;18:16; 


8:7,9;10:4;22:8;28:3,16; 


1:11 




u 


21:21;22:5,7,15,20;24:9; 


35:14,14;44:20;58:2;68:14, 


valuable (4) 




26:2;27:7,10;28:3,4;29:2; 


14;99:19,21;100:3;101:16; 


8:14;70:4;123:4;134:7 




UBL (3) 


30:14;33:7;35:2;36:19; 


109:18;110:10,21;117:7; 


valuation (3) 


153:5,9;156:16 


44:17;46:1;49:2;57:10; 


136:11;137:4,18;138:19; 


25:1;26:10;70:19 


UBL's (2) 


60:7,14,17;61:3;68:5,11,13, 


139:18;141:10;150:3; 


value (28) 


153:3;154:12 


17;69:13;70:6;71:8,12,13, 


156:5;157:4;159:17;165:9 


6:20;8:6,13,18,20;24:1; 


ultimate (1) 


19,21;75:5,16;76:10,17; 


used (42) 


25:7,16;26:15;37:20;49:12; 


48:15 


77:21;78:4;94:16,21;95:2,5, 


9:8;40:7;43:8;46:12; 


53:9,10,19;55:6;57:4,13; 


ultimately (12) 


15;96:12;102:9,16;103:14; 


47:8;52:2;56:20;57:1,2; 


58:8;60:14;66:8;121:1; 


8:16;31:9;34:11;35:4; 


105:5;107:10;108:3;119:7; 


65:16;73:7;76:9;77:21; 


138:2;140:19;143:9;150:7; 


38:7;41:4;89:3;92:16; 


120:3;122:16;123:7,13; 


80:16;81:4;85:4;87:9,15, 


159:13,20;166:21 


93:17;110:8;112:21;119:12 


124:17,19;129:5;130:6; 


17;88:17,19,21;89:12; 


values (2) 


unallocated (2) 


131:12;132:13;134:10,12, 


97:18;98:9,16;100:9; 


56:3;57:2 


117:4,15 


17,19;135:9,14,21;136:18, 


101:13,15;111:20;116:17; 


VBA (3) 


unauthorized (11) 


20;137:19;143:3;144:12; 


118:12;120:2,2;135:13; 


115:9,10,14 


29:13;31:3;52:14;59:18; 


146:10;148:18;150:2,12; 


137:16;146:14;156:9; 


verbatim (3) 


63:21;64:18;99:1;101:14; 


151:4;153:2;154:5,8; 


160:4;163:1,6;165:11 


2:9;36:16;37:12 


124:10;138:14;142:21 


155:19;156:1,7;157:8; 


useful (9) 


verify (1) 


uncensorable (1) 


159:7,16;161:6;164:4; 


23:5,6;67:9;75:8;80:21; 


43:15 


144:8 


165:7,8,16;166:1,3,18 


146:20;155:8;159:10,11 


version (13) 


uncertain (1) 


units (3) 


user (58) 


27:19,21;32:7,8,9;41:19; 


107:6 


24:12;26:4;123:8 


47:8;48:7,7,8,8,9,10,12, 


44:2;51:1;86:2;91:14; 


uncertified (1) 


unknown (1) 


15,18,20;49:3;50:2,14,15; 


153:11, 18;157:3 


2:12 


101:10 


53:4,9,12;54:2,19,20;55:3; 


via (1) 


unclassified (5) 


unless (2) 


56:8;57:10;58:2,4,9,13; 


43:17 


44:19,20;117:11;124:9; 


107:8;117:15 


61:19;62:13;64:10;65:3; 


Victor (2) 


162:12 


unlike (3) 


82:5,10,17,18;83:14,18; 


67:8,10 


unconventional (1) 


97:17;102:1;148:12 


86:17;89:14,20;96:21;97:1; 


video (66) 


18:18 


UnOIIlClal yl) 


yy .y 7 i^, 10, 1 WO. 1U. 1 / , 


34:20;35:1,7,16,20;36:6, 


under (8) 


123:19 


19;111:1;112:1,6,7;116:5; 


18;37:2,6,14,20;38:2,7,11, 


14-8-41 •5-52-9-58-1 S- 


unprecedented (1) 


118:7,18;121:9,11 


14 16-39-5 14-40-2 111? 

1T",1VJ,_J_7..J, lt,tU.Z,, 1 1,1/,, 


99:15,17;101:6;114:2 


161:1 


users (5) 


15,21,21;41:4,13,19;42:12, 



Min-U-Script® 



Provided by Freedom of the Press Foundation 



(194) turned - video 



United States vs. 


UNOFFICIAL DRAFT 


- Vol.21 


PFC Bradley E. Manning 


7/25/13 Afternoon Session 


July 25, 2013 


17,21;43:10,15,18;44:14, 


wake (1) 


161:2 


20;28:4,6,21;29:2,4,9,18; 


16,19;45:4,5;103:8,9,9,17, 


149:10 


weekly (3) 


30:1,2,20;31:9;33:15;34:10, 


19;105:1,12,18,20;106:2, 


walked (1) 


6:13;10:13;140:5 


11,13,21;35:4;38:8;40:1,11, 


12,15;128:4;129:10;134:3; 


102:8 


weeks (3) 


16,19;41:5;49:5;53:14,19; 


152:15;153:15,16,18,21; 


wantonly (1) 


10:5;33:11;45:17 


54:1,8;56:12;58:11;60:1,8; 


154:1,20;155:5;156:19; 


130:6 


Weiss (8) 


66:17;67:1;68:2,4;75:12; 


157:4,4,8;159:19 


wants (2) 


80:1,7,13;82:8,14;83:13; 


76:5;77:1,4,13;90:10; 


videos (1) 


20:3;163:12 


87:6;89:14 


91:12;92:17;93:6,8,20; 


105:6 


war (8) 


wellOintentioned (1) 


94:13,15;103:7;105:11,16; 


view (11) 


18:17;129:7;141:2;157:8; 


164:5 


106:2;108:18;109:4; 


14:1;50:17;52:2;78:12; 


163:20;165:13,14;166:19 


well-informed (1) 


113:17;116:19;117:12; 


82:10;83:18,19;86:18;88:5; 


warfare (3) 


160:10 


123:20;126:6,8,16;127:2, 


157:7;163:4 


4:13;141:3,14 


well-intentioned (2) 


11,15,16,21;128:2,3,5,11, 


viewed (5) 


warned (2) 


164:7,19 


16,20;129:1, 15,18,18; 


20:9;32:4;33:8;142:14; 


30:10;136:11 


well-known (1) 


130:20;134:5,8;135:14,15; 


145:7 


warning (2) 


141:15 


136:3,10,11;138:20;140:20; 


viewing (2) 


30:18;78:11 


weren't (1) 


141:20;142:8,11,18;144:1, 


33:10;41:13 


warnings (1) 


154:1 


4,6,8,10,18;145:8,10,14,21; 


views (1) 


33:13 


west (1) 


146:8;147:10,13;148:1,7, 


83:10 


Warrant (2) 


159:7 


14,21;149:3,5;152:9;153:7, 


violated (4) 


35:8;121:19 


western (1) 


10,19;154:1;155:2;159:11, 


57:20;64:19;99:1;118:15 


wars (2) 


159:6 


14;160:5,6,11, 11, 16,19; 


violating (1) 


5:1;155:12 


Wget (67) 


161:7,8;164:1 


109:20 


wartime (2) 


48:14;59:18;63:21;64:3, 


WikiLeaks' (1) 


violation (1) 


35:18;155:18 


6,18;65:1,2,2,10,14,17,20; 


126:19 


44:17 


watched (1) 


66:1;68:19;84:7,8,18,20,21; 


WikiLeaksorg (2) 


violently (1) 


45:20 


85:2,5,7,9,13,13,16;86:3,6, 


28:20;79:9 


163:11 


watching (2) 


7,8,10;87:10,15,17,20;88:9, 


Wikipedia (1) 


virtual (1) 


2:6;161:9 


19,19;89:5,12,17,18;91:5; 


144:8 


112:13 


way (11) 


93:18;96:14,16;97:11,14, 


Williamson (6) 


Virtually (1) 


11:11;52:4,14;53:11; 


15,17;98:1,6,9,10,12,15,18; 


109:7;114:12;115:15; 


42:14 


55:2;57:4,9;83:6;125:6,13; 


99:17;101:9,13,15,16,18, 


116:2,9,16 


visited (2) 


130:19 


20;102:3,19 


win (1) 


104:3;160:8 


ways (4) 


Wget-H (1) 


5:1 


visiting (1) 


49:7;57:20;116:3;166:5 


65:9 


Window (2) 


15:8 


weaknesses (2) 


What's (5) 


85:18;102:2 


Visual (3) 


164:16,18 


37:18;81:15;90:17;115:3; 


Windows (12) 


115:15,15;116:3 


weapon (1) 


135:10 


49:7,1 1,16,17,20,21;50:8, 


visualize (1) 


108:2 


whereabouts (1) 


9,12,18;53:2;74:12 


6:3 


weaponry (1) 


9:17 


Winter (1) 


VOLUME (5) 


10:4 


whereas (2) 


159:4 


1:1;17:12;40:5;92:11,13 


weapons (2) 


65:20;89:14 


wiped (3) 


volumes (4) 


37:9;141:10 


Whereupon (1) 


15:12;16:11;17:9 


74:7;92:11;164:9,9 


Weaver (7) 


42:3 


wiping (2) 


voluntarily (1) 


52:8;98:20;99:2,6,14; 


whistleblower (1) 


16:7;165:4 


135:19 


101:1,4 


166:20 


within (27) 


voluntary (1) 


web (39) 


White (2) 


9:9;10:5;14:4;19:4;21:1; 


136:1 


32:6;61:21;63:4,13;69:3; 


97:11;161:19 


22:12;23:10;24:5;33:4; 


von (1) 


73:3,7;82:6,7,10,13,19; 


whole (1) 


45:7;48:14;53:2;56:11; 


3:8 


83:5,8,9,10,19,19;86:14,14, 


41:19 


76:14;94:17;103:19;104:3; 


VS(1) 


17,19;87:10,11, 12,18,20; 


wholesale (1) 


110:9;115:16,21;119:17; 


1:5 


88:5,13;89:15;98:18; 


152:6 


131:19;132:12;144:12; 


vulnerabilities (1) 


102:14,21;103:21;106:13; 


whose (2) 


156:14;157:11;158:10 


34:13 


138:8;141:11;157:12; 


119:2;162:14 


without (19) 


vulnerable (2) 


163:14 


WHYTE (1) 


8:12,19,20;30:3;33:5; 


112:8,20 


website (24) 


3:7 


41:13;48:12,17;89:19; 




29:2,20;30:9;32: 12,15; 


Wide (1) 


92:19;97:16;120:16; 




w 


33:9,10;62:2;66:18;68:20; 


163:14 


130:11;131:4;136:15; 




72:4;82:18;104:10,15; 


widest (1) 


139:3;143:5;145:16;146:2 




wage (2) 


i VD.^Tj l*tZ.o, i^f, m-j. i^, 10, 


AO' 1 f> 
^fZ. ID 


witness (7) 


69:17;159:6 


145: 15; 146: 14; 160:6,9, 19 


WikiLeaks (141) 


23:16;67:7;70:8;95:6; 


wait 


week (4) 


4:11;8:9,10;15:4,9;17:8, 


101 -10- 122- 18- 123- 15 


83:7;86:19;87:19;105:6 


69:16;105:21;122:3; 


19;18:5,5,6;20:13;21:4,18, 


witnesses (6) 



Min-U-Script® 



Provided by Freedom of the Press Foundation 



(195) videos - witnesses 



United States vs. 

PFC Bradley E. Manning 



UNOFFICIAL DRAFT 
7/25/13 Afternoon Session 



- Vol.21 
July 25, 2013 



67:5;107:19;111:14,20; 

129:9;134:11 
vvmv (2) 

103:16;105:2 
woke (1) 

131:7 
Woods (2) 

61:4,9 
word (2) 

2:15;120:2 
Words (15) 

4:10;49:10;82:19;96:3,8; 

108:2;133:10;136:13; 

139:8;147:8,20,21;151:11; 

162:9;166:7 
work (15) 

12:15;28:16;45:18;58:14; 

69:10,20;81:21;122:3; 

136:7;140:2;141:6;148:15; 

156:4;162:5;165:4 
worked (4) 

28:14;69:12;82:2;121:8 
working (4) 

90:8;112:4;1 13:2,7 
works (1) 

69:16 
worksheet (3) 

91:14,18,21 
world (23) 

19:6;28:6;34:17;35:5; 

77:14;81:16;113:16; 

127:10;129:14;131:6; 

134:6;136:3,14;148:2; 

149:9;162:21;163:4,5,14; 

164:3,3;166:6;167:2 
world's (1) 

45:21 
worldwide (9) 

19:12;84:14,16;140:6; 

147:15,16;155:19;156:1,16 
worm (1) 

9:17 
worth (4) 

25:11;26:19;81:12;96:10 
write (2) 

115:10,10 
written (4) 

14:15,16;41:14;115:1 
wrote (1) 

18:1 
wrought (1) 

62:15 



X 



Xerox (1) 

125:17 
xlsx (5) 

91:15,16;92:3;93:4,12 
XXI (1) 

1:1 

xxx-xx-9504 (1) 

1:7 



Y 



yadda (2) 

13:15;14:4 
year (2) 

38:10;154:14 
years (7) 

7:3;11:2;46:8;132:14; 

138:9;151:20;157:11 
York (1) 

34:3 
young (1) 

166:16 



Z 



zip (7) 

74:4,9,1 1;92:10,14; 
93:14;105:2 







000 (5) 

63:4,5,6,13,16 
09(1) 

46:5 
09:30 (1) 

167:5 
0930 (1) 

126:1 



1 



1(31) 

12:21;13:6;15:7,9;16:1; 
24:13,15,20;27:15,15; 
32:10,15,16;33:9;40:6,6; 
41:8;45:10,12;47:1;65:7, 
12;126:4,10,11, 11, 12,20; 
130:5;142:16;144:4 
1:30 (1) 
1:16 

10 (19) 
26:16,20;90:9;103:4,4; 
104:2;105:2,7,9,12;106:4,6; 
107:9;121:13;123:12; 
132:14;138:9;148:5;157:11 

10:28 (1) 

46:12 
100 (4) 

19:1;138:8;157:12; 

160:12 
100,000 (1) 

130:16 

102 (2) 
91:13,19 

103 (1) 
13:7 

104 (5) 
92:2,9;134:1,9;155:7 

11 (3) 
63:17;79:21;105:16 



114 (2) 

32:20;33:3 

12 (4) 

46:8;63:15;74:19;76:14 
12,000 (1) 

121:15 
12:55 (1) 

74:12 
12010 (1) 

75:19 

122 (2) 
113:20;114:11 

123 (3) 
47:21;53:16;54:12 

1233 (1) 
122:4 

125 (5) 
16:3,4;51:14,15,19 

126 (2) 
15:14,19 

127 (4) 
40:5;74:8,14;92:13 

128 (2) 
104:11,17 

129 (3) 
104:7,7,19 

13 (8) 
34:8;40:2;60:5;75:19; 
76:14,21;81:19;109:12 

130 (3) 
54:3,7;55:20 

138 (1) 
130:17 

14 (7) 
32:10;39:16;72:5,6; 
144:5;145:9;161:1 

141 (2) 

75:17;106:7 

144 (3) 
11:14;114:18;115:2 

145 (1) 
115:13 

147 (2) 
111:7,13 

148 (1) 
111:14 

15 (10) 
27:15,17;35:5;39:17; 
58:19,21;75:13;81:18; 
127:21;143:11 

15:55 (2) 
53:17,18 

152 (1) 
13:3 

153 (4) 
134:21;153:12,12;154:7 

154 (4) 
72:18,21;73:10,18 

157 (3) 

64:2;84:19;85:7 
159 (3) 

89:21;90:3,11 
15-minute (1) 



125:4 

16 (5) 
72:5,6;108:8;109:16; 
159:3 

16:11 (3) 

53:17,18;56:17 
16:11:26 (1) 

56:10 
1609 (1) 

55:10 
169 (5) 

78:6,8,14,15;79:12 

17 (1) 
73:11 

17:48:51 (2) 
51:10,10 

173 (2) 
154:13,19 

174 (1) 
155:3 

177 (3) 
78:7,8;79:13 

178 (2) 
78:15,16 

179 (2) 
16:18,19 

18 (2) 
28:18;74:19 

180 (6) 
19:2;72:6;74:18;75:6,12, 
13 

1807 (1) 
72:5 

181 (5) 
31:15,16,21;74:18;75:6 

182 (2) 
135:2;153:21 

186 (1) 
45:8 

187 (1) 
87:13 

188 (2) 
86:5,5 

189 (1) 
65:7 

19 (5) 

32:20;33:4,9;46:6;142:14 
1966 (1) 

79:10 
1AAB (1) 

111:6 



2 



2(27) 

4:8;22:10,19;25:2;26:7; 
27:17;34:20,20;51:9;59:11, 
11;64:20;71:3,10;76: 15,15; 
103:4,5;104:3;108:8;126:5, 
11,13;130:5;131:15; 
145:12;153:2 
20(2) 

40:1;75:13 



Min-U-Script® 



Provided by Freedom of the Press Foundation 



(196) wmv - 20 



United States vs. 


UNOFFICIAL DRAFT 


- Vol.21 


PFC Bradley E. Manning 


7/25/13 Afternoon Session 


July 25, 2013 


20,000 (1) 


22211 (1) 


37 (2) 


167:9 


45:20 


1:11 


166:14,15 


504 (1) 


20,10 (1) 


23(1) 


38 (1) 


106:8 


16:8 


63:15 


35:2 


51 (3) 


200 (2) 


24(1) 


380,000 (2) 


43:1,1;121:15 


63:12,13 


39:17 


10:8;26:18 


52 (2) 


2004 (2) 


25(9) 


382 (2) 


137:6,11 


11:2;155:18 


1:16;15:21;66:17;128:5, 


51:17,20 


53,000 (1) 


2005 (1) 


8;129:1;139:6,8,13 


390,000 (1) 


90:12 


69:14 


250,000 (4) 


128:12 


534 (2) 


2007 (1) 


77:12;83:16;87:4;91:9 




43:3,4 




29:6 


251,000 (2) 


4 


56,000 (2) 


2008 (7) 


84:3;89:3 




69:20;70:2 




28:18,21;109:2,8;1 13:17; 


251,287 (5) 


4(15) 


5-8-2010 (1) 


138:11;144:10 


92:18;93:1,6,16,20 


4:8;26:11;29:12;62:19; 


35:5 


2009 (17) 


251,288 (5) 


70:17;92:10,15;98:9;108:9, 




11:1,2;32:10,16,20;33:4, 


91:21;93:5,12,15,19 


15;109:14,19;113:4; 


6 


11;38:15;62:1,5;103:7; 


25-2 (5) 


121:19;159:4 




126:20;142:14,16;144:4; 


52:9;98:21;99:1,15;124:4 


4,000 (2) 


6(6) 


145:2;155:18 


26(1) 


138:9;157:13 


4:8;46:5;48:2;53:15,17; 


2010 (91) 


20:20 


40(5) 


95:21 


13:1,6,10,10,13,13,21; 


27(2) 


19:14;32:11,19;48:21; 


61 (1) 


14:16,17;15:7,9,13;16:1; 


85:3;128:15 


69:16 


43:9 


17:1,4,5,10,15;18:15;20:20; 


28(3) 


40-hour (1) 


617 (9) 


32:10,10;35:6;39:1,2,8,17, 


90:5,6;128:15 


122:3 


23:18;27:11;70:8;71:15; 


18;43:2;45:19;46:5,11,15; 


285 (1) 


41 (3) 


72:2;95:7;96:13;122:18; 


47:4;48:3,5;51:10;56:10; 


45:7 


41:7;164:11,15 


123:14 


60:5;62:6,13,19;64:4,7; 


29(2) 


417 (2) 


628 (2) 


72:10,16;73:12,15,21; 


32:9,16 


46:17,17 


105:14,14 


74:10;75:18;79:10;81:18; 




417,000 (1) 


63(1) 




82:1;85:1,3,3,10,11;90:13; 


3 


19:17 


32:14 


91:8;92:3,6,10,15;93:7,9, 




42(3) 


64(1) 




11;97:10;104:3;105:3,7,9, 


3(29) 


4:14;19:8;141:4 


33:1 


11,12;108:20;113:6,7; 


13:10,10;26:6;29:12; 


425 (2) 


640 (2) 


121:21;127:21;128:3,5,8, 


41:16;45:10,13;47:1,20; 


72:7,10 


105:14,15 


11,15;143:11;144:5;145:9, 


59:12;64:20;66:10,11;71:3, 


43(1) 


641 (1) 


9;159:3,4 


9;76:15;90:13;92:3,6; 


145:7 


121:6 


2011 (4) 


95:18;96:6;108:8,9,10,14; 


44(1) 


668 (2) 


66:17;92:17;128:19; 


109: 14, 19; 145:20,20 


159:5 


43:3,4 


129:1 


3,300 (1) 


45(6) 






2013 (1) 


130:16 


27:20,21;29:12;30:16; 


7 


1:16 


3:22 (1) 


142:15;159:5 






20-page (1) 


62:21 


4-582 (1) 


7(21) 


111:14 


30 (9) 


64:19 


4:8;12:21;13:6,13,13; 


21 (3) 


13:20;15:13;17:4;25:7, 


4-5A3 (1) 


22:10,19;32:17;63:18;64:4, 


30:15;73:15;128:18 


13;56:18;74:4;83:1;84:15 


109:21 


7;66:1;70:16;85:1,3; 


210 (8) 


30-day (1) 


46(4) 


105:12;108:20;109:8; 


6:12;7:20;80:18;81:5; 


11:6 


21:2;27:21,21;142:16 


161:2;166:14,14 


98:5;100:2;139:21;147:7 


31 (6) 


47(3) 


700 (2) 


21st (2) 


16:7;17:4,9,14;47:4; 


111:7,9;116:13 


69:18;129:2 


4:13;141:3 


92:17 


470,000 (3) 


700,000 (8) 


22 (21) 


32 (1) 


14:19;17:3,11 


90:5,6;126:6;130:14; 


32:19;39:1,1,7;47:9; 


31:12 


48(5) 


136:2;163:17;164:1;165:13 


48:21;54:18;64:6;72:14,16; 


330 (1) 


16:6;111:7,9,12;116:13 


72(4) 


73:15,21;74:10,12;76:2; 


104:4 




11:2,13:137:11,11 




85:15;89:11;90:14;91:15; 


35 (2) 


5 


74,000 (5) 


128:11;143:19 


81:5;136:18 




111:10;119:18;121:5,14; 




22:28 (2) 


351C (1) 


5(18) 


122:11 


46:11;56:19 


55:2 


4:8;14:15;22:10,19;35:9; 


740,000 (1) 


22:28:21 (1) 


JO (1) 


OZO,0,1 Jjl o,0 J. Z 1,00.1 1, 


121:14 


46:16 


43:1 


11;95:17;105:11;123:9; 


75,000 (1) 


2200 


365 (2) 


128:3;163:8,9 




56:18 


51:16,19 


5:45 (1) 


78(2) 



Min-U-Script® 



Provided by Freedom of the Press Foundation 



(197) 20,000 - 78 



United States vs. 

PFC Bradley E. Manning 



UNOFFICIAL DRAFT 
7/25/13 Afternoon Session 



- Vol.21 
July 25, 2013 



16:4,5 
7-month (1) 

130:15 
7-pass (2) 

16:6;47:5 



8 



8(17) 

14:17;46:5,11,15;48:5; 

53:17,17;56:10;59:10;62:1, 

5;70:21;113:6;161:2,13; 

162:13;166:15 
80(3) 

55:17;69:9,20 
80C1 (1) 

56:5 
80C1049 (1) 

55:2 
81 (7) 

43:3,6;46:17,18;72:7,11; 
105:13 
82(7) 

62:9,16,18,20;63:5,15,19 
84(1) 

32:1 
86(2) 

16:5,5 



9 



9(11) 

59:8,11;72:10;75:18; 

84:16;90:6,6;113:7;123:2; 

147:18;148:4 
90(4) 

19:1,2;69:9;106:7 
90,000 (3) 

10:10;25:10,13 
900 (2) 

96:4,4 
95(3) 

66: 19,20; 162: 10 



Min-U-Script® 



Provided by Freedom of the Press Foundation 



(198) 7-month - 95